Sciweavers

370 search results - page 49 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
132
Voted
WSC
1998
15 years 3 months ago
Parallel Simulation for Aviation Applications
The Detailed Policy Assessment Tool (DPAT) is a widely used simulation of air traffic control that incorporates advanced technology for user-friendly operation. DPAT computes cong...
Frederick Wieland
105
Voted
MICCAI
2010
Springer
15 years 9 days ago
Micro-force Sensing in Robot Assisted Membrane Peeling for Vitreoretinal Surgery
Abstract. Vitreoretinal surgeons use 0.5mm diameter instruments to manipulate delicate tissue inside the eye while applying imperceptible forces that can cause damage to the retina...
Marcin Balicki, Ali Uneri, Iulian Iordachita, Jame...
TELSYS
2010
140views more  TELSYS 2010»
14 years 8 months ago
Information system security compliance to FISMA standard: a quantitative measure
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...
Elaine Hulitt, Rayford B. Vaughn
CSFW
2002
IEEE
15 years 6 months ago
A Privacy Policy Model for Enterprises
Privacy is an increasing concern in the marketplace. Although enterprises promise sound privacy practices to their customers, there is no technical mechanism to enforce them inter...
Günter Karjoth, Matthias Schunter
INFOCOM
2010
IEEE
15 years 10 days ago
CapAuth: A Capability-based Handover Scheme
—Existing handover schemes in wireless LANs, 3G/4G networks, and femtocells rely upon protocols involving centralized authentication servers and one or more access points. These ...
Liang Cai, Sridhar Machiraju, Hao Chen