Sciweavers

2838 search results - page 360 / 568
» Verifying Controlled Components
Sort
View
112
Voted
IEEESCC
2008
IEEE
15 years 7 months ago
Adaptive Secure Access to Remote Services
Since the inception of service-oriented computing paradigm, we have witnessed a plethora of services deployed across a broad spectrum of applications, ranging from conventional RP...
Hanping Lufei, Weisong Shi, Vipin Chaudhary
102
Voted
COLCOM
2007
IEEE
15 years 7 months ago
Towards trust-aware access management for ad-hoc collaborations
—In an ad-hoc collaborative sharing environment, attribute-based access control provides a promising approach in defining authorization over shared resources based on users’ p...
Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin H...
CSFW
2006
IEEE
15 years 6 months ago
Encoding Information Flow in Haskell
This paper presents an embedded security sublanguage for enforcing information-flow policies in the standard Haskell programming language. The sublanguage provides useful informa...
Peng Li, Steve Zdancewic
101
Voted
ISCAS
2005
IEEE
156views Hardware» more  ISCAS 2005»
15 years 6 months ago
Optimal 2 sub-bank memory architecture for bit plane coder of JPEG2000
—JPEG2000 image compression standard is designed to cater the needs of a large span of applications including numerous consumer products. However, its use is still restricted due...
Amit Kumar Gupta, Saeid Nooshabadi, David S. Taubm...
ARCS
2005
Springer
15 years 6 months ago
Reusable Design of Inter-chip Communication Interfaces for Next Generation of Adaptive Computing Systems
Abstract. The SoC (System-on-Chip) technology is used in small and flexible consumer electronic devices. SoCs include one or more microcontroller, memory, programmable logic, and ...
Vincent Kotzsch, Jörg Schneider, Günther...