Sciweavers

2655 search results - page 127 / 531
» Event Systems and Access Control
Sort
View
ICDCIT
2004
Springer
15 years 10 months ago
Vulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
Bharat K. Bhargava, Leszek Lilien
158
Voted
CDC
2009
IEEE
135views Control Systems» more  CDC 2009»
15 years 2 months ago
Continuous control of hybrid automata with imperfect mode information assuming separation between state estimation and control
Abstract-- The safety control problem for hybrid automata with imperfect mode information and continuous control is addressed. When the controller does not have access to the mode ...
Rajeev Verma, Domitilla Del Vecchio
128
Voted
EUROMICRO
2002
IEEE
15 years 10 months ago
Customer Choice in a Multi-Service Residential Access Network Environment
TORRENT is an EU-Supported Framework 5 project that is showing how intelligent control and negotiation capabilities can be built into access networks so as to give the residential...
Eric Scharf, Peter Hamer, Konstantinos Smparounis,...
173
Voted
APSEC
2005
IEEE
15 years 7 months ago
Using Dynamic Aspects for Delegating Fine-Grained Access Rights
This paper shows that a proper combination of instance-level aspects and dynamic deployment can be used to enhance an aspect-based access control system with dynamic and fine-grai...
Kung Chen
CHI
2008
ACM
16 years 5 months ago
A user study of policy creation in a flexible access-control system
Significant effort has been invested in developing expressive and flexible access-control languages and systems. However, little has been done to evaluate these systems in practic...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...