Sciweavers

97 search results - page 10 / 20
» Consistency Checking of Safety and Availability in Access Co...
Sort
View
ESOP
2010
Springer
15 years 6 months ago
Enforcing Stateful Authorization and Information Flow Policies in Fine
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforce their security policies would help, but, to date, no security-typed language h...
Nikhil Swamy, Juan Chen and Ravi Chugh
CASCON
2006
131views Education» more  CASCON 2006»
14 years 10 months ago
STAC: software tuning panels for autonomic control
One aspect of autonomic computing is the ability to identify, separate and automatically tune parameters related to performance, security, robustness and other properties of a sof...
Elizabeth Dancy, James R. Cordy
ESORICS
1994
Springer
15 years 1 months ago
On the Expressive Power of the Unary Transformation Model
The Transformation Model TRM was recently introduced 10 in the literature by Sandhu and Ganta. TRM is based on the concept of transformation of rights. The propagation of access ri...
Ravi S. Sandhu, Srinivas Ganta
CVRMED
1997
Springer
15 years 1 months ago
An integrated remote neurosurgical system
The Neurovisualization Lab at the University of Virginia is developing the Integrated Remote Neurosurgical System (IRNS) to allow mentoring of neurosurgical procedures in remote l...
B. Sean Graves, Joe Tullio, Minyan Shi, J. Hunter ...
CCECE
2009
IEEE
14 years 7 months ago
The Australian Coastal Ocean radar Network facility
The Australian Coastal Ocean radar Network (ACORN) is a monitoring network of HF radars which are being installed around Australia under a National Collaborative Research Infrastr...
Malcolm L. Heron