Sciweavers

11603 search results - page 71 / 2321
» Embedded System Security
Sort
View
SACMAT
2009
ACM
15 years 9 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
134
Voted
CRYPTO
2012
Springer
215views Cryptology» more  CRYPTO 2012»
13 years 7 months ago
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
We develop a new methodology for utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full sec...
Allison B. Lewko, Brent Waters
126
Voted
CSREAPSC
2006
15 years 6 months ago
A Real Time Scheduling Method for Embedded Multimedia Applications
Byoungchul Ahn, Ji-Hoon Kim, Dong Ha Lee, Sang Hoo...
151
Voted
TPDS
2008
202views more  TPDS 2008»
15 years 4 months ago
Control-Based Adaptive Middleware for Real-Time Image Transmission over Bandwidth-Constrained Networks
Real-time image transmission is crucial to an emerging class of distributed embedded systems operating in open network environments. Examples include avionics mission replanning ov...
Xiaorui Wang, Ming Chen, Huang-Ming Huang, Venkita...
JTRES
2009
ACM
15 years 11 months ago
CDx: a family of real-time Java benchmarks
Tomás Kalibera, Jeff Hagelberg, Filip Pizlo...