Sciweavers

2655 search results - page 152 / 531
» Event Systems and Access Control
Sort
View
HICSS
2010
IEEE
155views Biometrics» more  HICSS 2010»
15 years 12 months ago
Experiences Validating the Access Policy Tool in Industrial Settings
—The Access Policy Tool (APT) analyzes the firewall configuration in an enterprise network for compliance with global access policy, e.g., such as describes the industry’s be...
David M. Nicol, William H. Sanders, Mouna Seri, Sa...
HPDC
1999
IEEE
15 years 9 months ago
The UNICORE Architecture Seamless Access to Distributed Resources
Seamless access to different systems of different vendors at different sites is an important prerequisite to effective and efficient use of distributed resources. Learning about n...
Mathilde Romberg
127
Voted
SRDS
2003
IEEE
15 years 10 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
ITICSE
2005
ACM
15 years 10 months ago
Providing students universal access to a centralized, graphical computing environment
We investigate the use of a thin-client based configuration in providing students with universal access to a centralized, graphical computing environment. The primary goal is to ...
Michael H. Goldwasser, David Letscher
166
Voted
AGTIVE
2007
Springer
15 years 11 months ago
Programmed Graph Rewriting with DEVS
In this article, we propose to use the Discrete EVent system Specification (DEVS) formalism to describe and execute graph transformation control structures. We provide a short rev...
Eugene Syriani, Hans Vangheluwe