Sciweavers

87 search results - page 17 / 18
» Rule support for role-based access control
Sort
View
CODES
2005
IEEE
13 years 12 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
HICSS
2003
IEEE
136views Biometrics» more  HICSS 2003»
13 years 11 months ago
Dynamic Network Interface Selection in Multihomed Mobile Hosts
Abstract—Current mobile devices are often equipped with several network interfaces, which may be of different access technologies, both wireless and cellular. Different requireme...
Jukka Ylitalo, Tony Jokikyyny, Tero Kauppinen, Ant...
QSHINE
2009
IEEE
14 years 1 months ago
Integration of OMF-Based Testbeds in a Global-Scale Networking Facility
PlanetLab is a global scale platform for experimentation of new networking applications in a real environment. It consists of several nodes, offered by academic institutions or co...
Giovanni Di Stasi, Stefano Avallone, Roberto Canon...
COMPSAC
2007
IEEE
14 years 20 days ago
An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment
We present in this paper an adaptive security model for Multi-agent systems. A security meta-model has been developed in which the traditional role concept has been extended. The ...
Liang Xiao 0002, Andrew Peet, Paul H. Lewis, Srina...
MMMACNS
2001
Springer
13 years 10 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato