Sciweavers

425 search results - page 36 / 85
» Audit
Sort
View
92
Voted
ICPADS
2005
IEEE
15 years 3 months ago
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access
In the audit process of Internet activities of users in a local area network, one of the most difficult problems is the problem of source authentication i.e. establishing securely...
Yusuf Uzunay, Kemal Bicakci
64
Voted
IFIP
2004
Springer
15 years 2 months ago
Discretionary Overriding of Access Control in the Privilege Calculus
We extend a particular access control framework, the Privilege Calculus, with a possibility to override denied access for increased flexibility in hard to define or unanticipated...
Erik Rissanen, Babak Sadighi Firozabadi, Marek J. ...
80
Voted
SIGUCCS
2003
ACM
15 years 2 months ago
Putting OSX in an open access lab: (or "The Joy of X")
This paper discusses the challenges of putting Apple Macintosh OSX into open access and computer lab environments. Categories and Subject Descriptors K.6.4 [Management of Computin...
David L. R. Houston
69
Voted
FM
2001
Springer
99views Formal Methods» more  FM 2001»
15 years 2 months ago
Transacted Memory for Smart Cards
Transacted Memory offers persistence, undoability and auditing. We present a Java/JML Reference Model of the Transacted Memory system on the basis of our earlier separate Z model...
Pieter H. Hartel, Michael J. Butler, Eduard de Jon...
115
Voted
OFAI
1997
Springer
143views Robotics» more  OFAI 1997»
15 years 1 months ago
Autonomous Virtual Actors Based on Virtual Sensors
In this paper, we present current research developments in the Virtual Life of autonomous synthetic actors. After a brief description of the perception action principles with a fe...
Daniel Thalmann, Hansrudi Noser, Zhiyong Huang