Sciweavers

393 search results - page 28 / 79
» Security Architectures for Controlled Digital Information Di...
Sort
View
SACMAT
2010
ACM
15 years 11 days ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
CHI
1998
ACM
15 years 6 months ago
A Multiple Device Approach for Supporting Whiteboard-Based Interactions
In this paper, we propose a multiple-device approach for supporting informal meetings using a digital whiteboard. Traditional digital whiteboard systems often suffer from a limite...
Jun Rekimoto
SASO
2007
IEEE
15 years 8 months ago
e-SAFE: An Extensible, Secure and Fault Tolerant Storage System
With the rapidly falling price of hardware, and increasingly available bandwidth, the storage technology is seeing a paradigm shift from centralized and managed mode to distribute...
Sandip Agarwala, Arnab Paul, Umakishore Ramachandr...
IMCS
2007
77views more  IMCS 2007»
15 years 1 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
DAC
2005
ACM
16 years 2 months ago
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Kris Tiri, Ingrid Verbauwhede