Sciweavers

3271 search results - page 231 / 655
» Controlled Multicast Framework
Sort
View
IJNSEC
2010
145views more  IJNSEC 2010»
14 years 11 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
ICCV
2007
IEEE
16 years 6 months ago
Variational optimal control technique for the tracking of deformable objects
In this paper, a new framework for the tracking of closed curves is described. The proposed approach, formalized through an optimal control technique, enables a continuous trackin...
Nicolas Papadakis, Étienne Mémin
241
Voted
GIS
2008
ACM
16 years 5 months ago
A location aware role and attribute based access control system
In this paper, we follow the role-based access control (RBAC) approach and extend it to provide for the dynamic association of roles with users. In our framework, privileges assoc...
Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko...
ESORICS
2002
Springer
16 years 4 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti
ICRA
2009
IEEE
191views Robotics» more  ICRA 2009»
15 years 11 months ago
Distributed coverage control for mobile sensors with location-dependent sensing models
— This paper addresses the problem of coverage control of a network of mobile sensors. In the current literature, this is commonly formulated as a locational optimization problem...
Ajay Deshpande, Sameera Poduri, Daniela Rus, Gaura...