Sciweavers

443 search results - page 41 / 89
» Secure remote control model for information appliances
Sort
View
HIPEAC
2005
Springer
15 years 5 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
SACMAT
2003
ACM
15 years 5 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
GIS
2008
ACM
15 years 26 days ago
Towards a scalable model for location privacy
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up ne...
Nayot Poolsappasit, Indrakshi Ray
IPAW
2010
14 years 9 months ago
Towards a Threat Model for Provenance in e-Science
Abstract. Scientists increasingly rely on workflow management systems to perform large-scale computational scientific experiments. These systems often collect provenance informatio...
Luiz M. R. Gadelha Jr., Marta Mattoso, Michael Wil...
SACMAT
2009
ACM
15 years 6 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...