Sciweavers

137 search results - page 25 / 28
» Verifiable Attribute Based Encryption
Sort
View
SEC
2008
14 years 11 months ago
Role Signatures for Access Control in Open Distributed Systems
Implementing access control efficiently and effectively in an open and distributed system is a challenging problem. One reason for this is that users requesting access to remote re...
Jason Crampton, Hoon Wei Lim
146
Voted
JTRES
2010
ACM
14 years 9 months ago
The design of SafeJML, a specification language for SCJ with support for WCET specification
Safety-Critical Java (SCJ) is a dialect of Java that allows programmers to implement safety-critical systems, such as software to control airplanes, medical devices, and nuclear p...
Ghaith Haddad, Faraz Hussain, Gary T. Leavens
105
Voted
JHSN
2006
267views more  JHSN 2006»
14 years 9 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
DBKDA
2010
IEEE
144views Database» more  DBKDA 2010»
14 years 8 months ago
Analysis of the Quality of Life after an Endoscopic Thoracic Sympathectomy: A Business Intelligence Approach
— Primary hyperhidrosis, a disorder characterized by an excessive sweating, has been treated by endoscopic thoracic sympathectomy. As a consequence of the surgery, patients impro...
Diana Goncalves, Maribel Yasmina Santos, Jorge Cru...
ACIVS
2009
Springer
14 years 7 months ago
Concealed Object Perception and Recognition Using a Photometric Stereo Strategy
Abstract. Following a review of current hidden objects detection techniques in a range of security applications, a strategy based on an innovative, low-cost photometric stereo tech...
Jiuai Sun, Melvyn L. Smith, Abdul R. Farooq, Lyndo...