Sciweavers

370 search results - page 67 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
PVLDB
2008
197views more  PVLDB 2008»
14 years 9 months ago
Dynamic partitioning of the cache hierarchy in shared data centers
Due to the imperative need to reduce the management costs of large data centers, operators multiplex several concurrent database applications on a server farm connected to shared ...
Gokul Soundararajan, Jin Chen, Mohamed A. Sharaf, ...
RBAC
2000
129views more  RBAC 2000»
14 years 10 months ago
Enabling technologies for role based online decision engines
: Enabling Technologies for Role Based Online Decision Engines Thomas Hildmann, Thomas Gebhardt 22-Feb-2000 The goal of our work at the Technical University of Berlin is to develop...
Thomas Gebhardt, Thomas Hildmann
MICCAI
2004
Springer
15 years 10 months ago
Enhancement of Visual Realism with BRDF for Patient Specific Bronchoscopy Simulation
Abstract. This paper presents a novel method for photorealistic rendering of the bronchial lumen by directly deriving matched shading and texture parameters from video bronchoscope...
Adrian James Chung, Fani Deligianni, Pallav Shah, ...
ICFP
2010
ACM
14 years 10 months ago
Security-typed programming within dependently typed programming
Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmers to express and enforce access control and information flow policies. Most of ...
Jamie Morgenstern, Daniel R. Licata
87
Voted
CCS
2008
ACM
14 years 11 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...