Sciweavers

2655 search results - page 90 / 531
» Event Systems and Access Control
Sort
View
PCM
2004
Springer
101views Multimedia» more  PCM 2004»
15 years 10 months ago
Correlation Filters for Facial Recognition Login Access Control
Abstract. In this paper we utilise the minimum average correlation energy (MACE) and unconstrained minimum average correlation energy (UMACE) filters in conjunction with two corre...
Daniel E. Riedel, Wanquan Liu, Ronny Tjahyadi
161
Voted
AINA
2007
IEEE
15 years 8 months ago
Itinerary-Based Access Control for Mobile Tasks in Scientific Workflows
Current scientific workflow models require datasets to be transferred from their source to the hosts where they can be processed. This seriously impedes data-intensive application...
Zijiang Yang, Shiyong Lu, Ping Yang
ECEASST
2008
106views more  ECEASST 2008»
15 years 4 months ago
Controlling resource access in Directed Bigraphs
: We study directed bigraph with negative ports, a bigraphical framework for representing models for distributed, concurrent and ubiquitous computing. With respect to previous vers...
Davide Grohmann, Marino Miculan
143
Voted
SACMAT
2009
ACM
15 years 11 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
SACMAT
2011
ACM
14 years 7 months ago
Anomaly discovery and resolution in web access control policies
The advent of emerging technologies such as Web services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effec...
Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni