Sciweavers

370 search results - page 40 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
INFOCOM
1992
IEEE
15 years 6 months ago
An Assessment of State and Lookup Overhead in Routers
The current Internet is based on a stateless (datagram) architecture. However, many recent proposals rely on the maintenance of state information within network routers, leading t...
Deborah Estrin, Danny J. Mitzel
DBSEC
2000
153views Database» more  DBSEC 2000»
15 years 3 months ago
Protecting Privacy from Continuous High-resolution Satellite Surveillance
Privacy refers to controlling the dissemination and use of personal data, including information that is knowingly disclosed, as well as data that are unintentionally revealed as a ...
Soon Ae Chun, Vijayalakshmi Atluri
SCAM
2007
IEEE
15 years 8 months ago
Quality Assessment for Embedded SQL
—The access of information systems to underlying relational databases is commonly programmed using embedded SQL queries. Such embedded queries may take the form of string literal...
Huib van den Brink, Rob van der Leek, Joost Visser
ESORICS
2009
Springer
16 years 2 months ago
PCAL: Language Support for Proof-Carrying Authorization Systems
By shifting the burden of proofs to the user, a proof-carrying authorization (PCA) system can automatically enforce complex access control policies. Unfortunately, managing those p...
Avik Chaudhuri, Deepak Garg
VTC
2006
IEEE
109views Communications» more  VTC 2006»
15 years 8 months ago
Evaluation of a Novel Low Complexity Smart Antenna for Wireless LAN Systems
— A novel smart antenna is described, which is conceived as a low complexity inexpensive upgrade for IEEE 802.11b/g Wireless Local Area Network (WLAN) systems. Using smart antenn...
Timothy J. Harrold, Dean C. Kemp, Mark A. Beach, C...