Sciweavers

769 search results - page 105 / 154
» Policy Storage for Role-Based Access Control Systems
Sort
View
CCS
2010
ACM
15 years 23 days ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
90
Voted
IJCNN
2007
IEEE
15 years 6 months ago
Optimal Control of a Photovoltaic Solar Energy System with Adaptive Critics
- This paper presents an optimal energy control scheme for a grid independent photovoltaic (PV) solar system consisting of a PV array, battery energy storage, and time varying load...
Richard L. Welch, Ganesh K. Venayagamoorthy
113
Voted
IJISEC
2007
149views more  IJISEC 2007»
15 years 15 days ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers
SACMAT
2003
ACM
15 years 5 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
101
Voted
CC
2007
Springer
109views System Software» more  CC 2007»
15 years 6 months ago
Layout Transformations for Heap Objects Using Static Access Patterns
As the amount of data used by programs increases due to the growth of hardware storage capacity and computing power, efficient memory usage becomes a key factor for performance. Si...
Jinseong Jeon, Keoncheol Shin, Hwansoo Han