Sciweavers

577 search results - page 64 / 116
» Engineering Sufficiently Secure Computing
Sort
View
EENERGY
2010
15 years 7 months ago
Mobile networks unplugged
Mobile network access has seemingly become ubiquitous in industrialized countries. With data services becoming sufficiently fast, usable, and affordable, demand is growing rapidly...
Jukka Manner, Marko Luoma, Jörg Ott, Jyri H&a...
SACMAT
2009
ACM
15 years 9 months ago
Supporting RBAC with XACML+OWL
XACML does not natively support RBAC and even the specialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty. Exte...
Rodolfo Ferrini, Elisa Bertino
CCS
2004
ACM
15 years 8 months ago
Fragile mixing
No matter how well designed and engineered, a mix server offers little protection if its administrator can be convinced to log and selectively disclose correspondences between it...
Michael K. Reiter, XiaoFeng Wang
ICCSA
2010
Springer
15 years 8 months ago
Geospatial Analysis of Cooperative Works on Asymmetric Information Environment
In the so-called Information-Explosion Era, astronomical amount of information is ubiquitously produced and digitally stored. It is getting more and more convenient for cooperative...
Tetsuya Kusuda, Tetsuro Ogi
NSDI
2004
15 years 4 months ago
Path-Based Failure and Evolution Management
We present a new approach to managing failures and evolution in large, complex distributed systems using runtime paths. We use the paths that requests follow as e through the syst...
Mike Y. Chen, Anthony Accardi, Emre Kiciman, David...