Sciweavers

3979 search results - page 173 / 796
» Wild control operators
Sort
View
77
Voted
CCS
2007
ACM
15 years 4 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
88
Voted
CCS
2007
ACM
15 years 4 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
84
Voted
CASES
2007
ACM
15 years 2 months ago
Towards understanding architectural tradeoffs in MEMS closed-loop feedback control
Micro-Electro-Mechanical Systems (MEMS) combine lithographically formed mechanical structures with electrical elements to create physical systems that operate on the scale of micr...
Greg Hoover, Forrest Brewer, Timothy Sherwood
POLICY
2009
Springer
15 years 4 months ago
Towards Session-Aware RBAC Administration and Enforcement with XACML
Abstract—An administrative role-based access control (ARBAC) model specifies administrative policies over a role-based access control (RBAC) system, where an administrative perm...
Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan C...
85
Voted
ICRA
2007
IEEE
122views Robotics» more  ICRA 2007»
15 years 4 months ago
Force Redistribution in a Quadruped Running Trot
Abstract— In this paper, an attitude control strategy is developed for a high-speed quadruped trot. The forces in the trot are redistributed among the legs to stabilize the pitch...
Luther R. Palmer, David E. Orin