Sciweavers

27 search results - page 4 / 6
» Towards analyzing complex operating system access control co...
Sort
View
HICSS
2003
IEEE
151views Biometrics» more  HICSS 2003»
15 years 2 months ago
A Simple GSPN for Modeling Common Mode Failures in Critical Infrastructures
It is now apparent that our nation’s infrastructures and essential utilities have been optimized for reliability in benign operating environments. As such, they are susceptible ...
Axel W. Krings, Paul W. Oman
SACMAT
2009
ACM
15 years 3 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
IFIP
2003
Springer
15 years 2 months ago
Exact Probabilistic Analysis of the Limited Scheduling Algorithm for Symmetrical Bluetooth Piconets
Efficient communication in Bluetooth scatternets requires design of intra and inter-piconet scheduling algorithms, and therefore numerous algorithms have been proposed. However, du...
Gil Zussman, Uri Yechiali, Adrian Segall
78
Voted
SACMAT
2003
ACM
15 years 2 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
ISER
2000
Springer
84views Robotics» more  ISER 2000»
15 years 1 months ago
Autonomous Injection of Biological Cells Using Visual Servoing
: The ability to analyze individual cells rather than averaged properties over a population is a major step towards understanding the fundamental elements of biological systems. Re...
Yu Sun, Bradley J. Nelson