Sciweavers

1300 search results - page 234 / 260
» Association Schemoids and Their Categories
Sort
View
103
Voted
CODES
2004
IEEE
15 years 2 months ago
A loop accelerator for low power embedded VLIW processors
The high transistor density afforded by modern VLSI processes have enabled the design of embedded processors that use clustered execution units to deliver high levels of performan...
Binu K. Mathew, Al Davis
CCS
2006
ACM
15 years 2 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang
84
Voted
CCS
2006
ACM
15 years 2 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
108
Voted
DRM
2006
Springer
15 years 2 months ago
The problem with rights expression languages
In this paper we consider the functionality that a rights expression language (REL) should provide within a digital rights management (DRM) environment. We begin by noting the dea...
Pramod A. Jamkhedkar, Gregory L. Heileman, Iv&aacu...
92
Voted
ICSE
2000
IEEE-ACM
15 years 2 months ago
Software needs engineering: a position paper
When the general press refers to `software' in its headlines, then this is often not to relate a success story, but to expand on yet another `software-risk-turned-problem-sto...
Jane Grimson, Hans-Jürgen Kugler