Sciweavers

807 search results - page 37 / 162
» Term Rewriting for Access Control
Sort
View
SAC
2011
ACM
14 years 4 months ago
Secure shared continuous query processing
Data stream management systems (DSMSs) process continuous queries over streaming data in real-time adhering to quality of service requirements. The data streams generated from sen...
Raman Adaikkalavan, Thomas Perez
SACMAT
2006
ACM
15 years 8 months ago
Towards reasonability properties for access-control policy languages
The growing importance of access control has led to the definition of numerous languages for specifying policies. Since these languages are based on different foundations, langua...
Michael Carl Tschantz, Shriram Krishnamurthi
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
15 years 5 months ago
An approach for the state estimation of Takagi-Sugeno models and application to sensor fault diagnosis
— In this paper, a new method to design an observer for nonlinear systems described by Takagi-Sugeno (TS) model, with unmeasurable premise variables, is proposed. Most of existin...
Dalil Ichalal, Benoît Marx, José Rago...
CCS
2004
ACM
15 years 7 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
MICRO
2009
IEEE
147views Hardware» more  MICRO 2009»
15 years 8 months ago
Complexity effective memory access scheduling for many-core accelerator architectures
Modern DRAM systems rely on memory controllers that employ out-of-order scheduling to maximize row access locality and bank-level parallelism, which in turn maximizes DRAM bandwid...
George L. Yuan, Ali Bakhoda, Tor M. Aamodt