Sciweavers

2429 search results - page 222 / 486
» Using Aspects to Design a Secure System
Sort
View
208
Voted
TSMC
2010
14 years 10 months ago
Distributed Explicit Rate Schemes in Multi-Input-Multi-Output Network Systems
Abstract--With the ever-increasing wireless/wired data applications recently, considerable efforts have focused on the design of distributed explicit rate flow control schemes for ...
Naixue Xiong, Athanasios V. Vasilakos, Laurence Ti...
97
Voted
ISI
2005
Springer
15 years 9 months ago
An Ontological Approach to the Document Access Problem of Insider Threat
Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the r...
Boanerges Aleman-Meza, Phillip Burns, Matthew Eave...
136
Voted
EVOW
2001
Springer
15 years 8 months ago
Interactions between Art and Mobile Robotic System Engineering
The field of mobile robotics offers a new medium for public entertainment and art. Mobile robots can move, react, and interact in the real world, generating behaviors that can be u...
Francesco Mondada, Skye Legon
CCS
2001
ACM
15 years 8 months ago
Practical forward secure group signature schemes
A group signature scheme allows a group member to sign messages anonymously on behalf of the group, while in case of a dispute, a designated entity can reveal the identity of a si...
Dawn Xiaodong Song
126
Voted
CCS
2006
ACM
15 years 7 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang