Sciweavers

2655 search results - page 66 / 531
» Event Systems and Access Control
Sort
View
POLICY
2005
Springer
15 years 10 months ago
Automated Decomposition of Access Control Policies
Modern dynamic distributed information systems need access control policies to address controlling access to multiple resources that are distributed. The s may be considered as a ...
Linying Su, David W. Chadwick, Andrew Basden, Jame...
CCS
2007
ACM
15 years 10 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
MM
2005
ACM
129views Multimedia» more  MM 2005»
15 years 10 months ago
The "control of fear": an interactive art experiencing and presenting system with multimodal sensors and media
The “Control of Fear” project is an interactive art exhibition project to provide the general public an opportunity to experience what might occur to them if their lives were ...
Chin Chih Yang, Lipin Liu, Jacy Chen
CCS
2007
ACM
15 years 8 months ago
Efficient techniques for realizing geo-spatial access control
The problem of key management for access control systems has been well-studied, and the literature contains several schemes for hierarchy-based and temporal-based access control. ...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
SAC
2011
ACM
14 years 7 months ago
Secure shared continuous query processing
Data stream management systems (DSMSs) process continuous queries over streaming data in real-time adhering to quality of service requirements. The data streams generated from sen...
Raman Adaikkalavan, Thomas Perez