Sciweavers

3712 search results - page 434 / 743
» Role-Based Access Control
Sort
View
ICSM
2009
IEEE
15 years 11 months ago
BCC: Enhancing code completion for better API usability
Nowadays, programmers spend much of their workday dealing with code libraries and frameworks that are bloated with APIs. One common way of interacting with APIs is through Code Co...
David M. Pletcher, Daqing Hou
ICST
2009
IEEE
15 years 11 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry
DATE
2008
IEEE
119views Hardware» more  DATE 2008»
15 years 11 months ago
Process Variation Aware Issue Queue Design
In sub-90nm process technology it becomes harder to control the fabrication process, which in turn causes variations between the design-time parameters and the fabricated paramete...
Raghavendra K, Madhu Mutyam
GLOBECOM
2008
IEEE
15 years 11 months ago
A Secure VANET MAC Protocol for DSRC Applications
— Vehicular ad hoc networking is an important component of Intelligent Transportation Systems. The main benefit of vehicular ad hoc network (VANET) communication is seen in activ...
Yi Qian, Kejie Lu, Nader Moayeri
HICSS
2008
IEEE
211views Biometrics» more  HICSS 2008»
15 years 11 months ago
Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks
—In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol using smart cards for home networks. The proposed scheme is to authenti...
Jongpil Jeong, Min Young Chung, Hyunseung Choo