Sciweavers

2061 search results - page 53 / 413
» Authorization for Metacomputing Applications
Sort
View
115
Voted
IEEECIT
2010
IEEE
14 years 11 months ago
Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection
—This paper presents VSK, a lightweight adaptable OS authorization architecture suitable for self-protection of pervasive devices. A “virtual” management plane, separate from...
Ruan He, Marc Lacoste, Jean Leneutre
TOMACS
2011
139views more  TOMACS 2011»
14 years 7 months ago
The double CFTP method
We consider the problem of the exact simulation of random variables Z that satisfy the distributional identity Z L = V Y + (1 − V )Z, where V ∈ [0, 1] and Y are independent, an...
Luc Devroye, Lancelot F. James
89
Voted
KCAP
2005
ACM
15 years 6 months ago
Pooling commentaries on legal texts from lawyers and experts in a collaborative work
This short paper presents a methodological framework for commentaries from various sources on the same texts allowing them to be assembeled in an intelligent and coherent way. Cat...
El-Hassan Bezzazi
WSC
1998
15 years 1 months ago
Modeling with Extend
This document presents an overview of the Extend modeling environment. Extend is a general purpose graphically oriented discrete event and continuous simulation application with a...
Jim Rivera
88
Voted
CCS
2010
ACM
15 years 7 months ago
Toward practical authorization-dependent user obligation systems
Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be u...
Murillo Pontual, Omar Chowdhury, William H. Winsbo...