Sciweavers

1818 search results - page 181 / 364
» How users use access control
Sort
View
152
Voted
ACSAC
2002
IEEE
15 years 10 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
IISWC
2009
IEEE
15 years 11 months ago
SD-VBS: The San Diego Vision Benchmark Suite
—In the era of multi-core, computer vision has emerged as an exciting application area which promises to continue to drive the demand for both more powerful and more energy effi...
Sravanthi Kota Venkata, Ikkjin Ahn, Donghwan Jeon,...
SACMAT
2011
ACM
14 years 7 months ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
SIGMOD
2003
ACM
179views Database» more  SIGMOD 2003»
15 years 10 months ago
Data Grid Management Systems
: The “Grid” is an emerging infrastructure for coordinating access across autonomous organizations to distributed, heterogeneous computation and data resources. Data grids are ...
Arun Jagatheesan, Arcot Rajasekar
ICCS
2001
Springer
15 years 9 months ago
Supporting Car-Parrinello Molecular Dynamics with UNICORE
This paper presents the integration of application specific interfaces in the UNICORE Grid infrastructure. UNICORE provides a seamless and secure mechanism to access distributed s...
Valentina Huber