Sciweavers

123 search results - page 18 / 25
» Modeling the Trust Boundaries Created by Securable Objects
Sort
View
SAC
2000
ACM
15 years 4 months ago
Making Tuple Spaces Safe for Heterogeneous Distributed Systems
Linda is a high level communication model which allows agents to communicate via a shared tuple spaces without knowing each other’s identities and without having to arrange for ...
Naftaly H. Minsky, Yaron Minsky, Victoria Ungurean...
NDSS
1997
IEEE
15 years 4 months ago
Hierarchical Organization of Certification Authorities for Secure Environments
This paper presents a model of hierarchical organization of Certification Authorities which can be applied to any open system network. In order to study the feasibility of the pro...
Lourdes López Santidrián, Justo Carr...
DBSEC
2004
170views Database» more  DBSEC 2004»
15 years 1 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
TOG
2012
307views Communications» more  TOG 2012»
13 years 2 months ago
Ghost SPH for animating water
We propose a new ghost fluid approach for free surface and solid boundary conditions in Smoothed Particle Hydrodynamics (SPH) liquid simulations. Prior methods either suffer from...
Hagit Schechter, Robert Bridson
CVIU
2011
14 years 6 months ago
Sampled medial loci for 3D shape representation
The medial axis transform is valuable for shape representation as it is complete and captures part structure. However, its exact computation for arbitrary 3D models is not feasibl...
Svetlana Stolpner, Sue Whitesides, Kaleem Siddiqi