Sciweavers

370 search results - page 51 / 74
» Providing Dynamic Security Control in a Federated Database
Sort
View
USS
2004
14 years 11 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson
NAR
2010
165views more  NAR 2010»
14 years 4 months ago
PhosPhAt: the Arabidopsis thaliana phosphorylation site database. An update
: Growth and development of plants depends on uptake and assimilation of nutrients. Many assimilation products of macronutrients are not only essential for plant growth but also ha...
Pawel Durek, Robert Schmidt, Joshua L. Heazlewood,...
SACMAT
2006
ACM
15 years 3 months ago
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...
James B. D. Joshi, Elisa Bertino
CODES
2005
IEEE
14 years 11 months ago
FIDES: an advanced chip multiprocessor platform for secure next generation mobile terminals
We propose a secure platform on a chip multiprocessor, known as FIDES, in order to enable next generation mobile terminals to execute downloaded native applications for Linux. Its...
Hiroaki Inoue, Akihisa Ikeno, Masaki Kondo, Junji ...
ICFP
2003
ACM
15 years 9 months ago
A static type system for JVM access control
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementat...
Tomoyuki Higuchi, Atsushi Ohori