نتایج جستجو برای: access restrictions to machines

تعداد نتایج: 10664006  

Journal: :CoRR 2010
Jayanthkumar Kannan Petros Maniatis Byung-Gon Chun

This paper introduces the notion of a secure data capsule, which refers to an encapsulation of sensitive user information (such as a credit card number) along with code that implements an interface suitable for the use of such information (such as charging for purchases) by a service (such as an online merchant). In our capsule framework, users provide their data in the form of such capsules to...

2009
Jie Chen Yan Huang

In the process of realization Internet-based visualization system of the protein molecules, system needs to allow users to use the system to observe the molecular structure of the local computer, that is, customers can generate the three-dimensional graphics from PDB file on the client computer. This requires Applet access to local file, related to the Applet security restrictions question. In ...

This paper presents a mathematical model for designing cellular manufacturing systems (CMSs) solved by genetic algorithms. This model assumes a dynamic production, a stochastic demand, routing flexibility, and machine flexibility. CMS is an application of group technology (GT) for clustering parts and machines by means of their operational and / or apparent form similarity in different aspects ...

2004
PHILLIP B. LEVINE DOUGLAS STAIGER

Theory suggests that abortion restrictions will influence fertility outcomes such as pregnancy, abortion, and birth. This paper exploits the variations in abortion policy generated in Eastern Europe in the late 1980s and early 1990s to examine their impact on fertility outcomes. We distinguish among countries with severe, moderate, and few restrictions on abortion access and examine the impact ...

1997
Chad Yoshikawa Brent Chun Paul Eastham Amin Vahdat Thomas Anderson David Culler

Individual machines are no longer sufficient to handle the offered load to many Internet sites. To use multiple machines for scalable performance, load balancing, fault transparency, and backward compatibility with URL naming must be addressed. A number of approaches have been developed to provide transparent access to multi-server Internet services including HTTP redirect, DNS aliasing, Magic ...

1998
G. Gheorghiu Tatyana Ryutov B. Clifford Neuman

One of the most difficult problems to be solved by metacomputing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved in a metacomputing environment often span multiple administrative domains, each with its own security policy. This paper presents a distributed authorization model used by our resource allocation system, the Prospero R...

Journal: :journal of reproduction and infertility 0

0

2002
Manuel Koch Luigi V. Mancini Francesco Parisi-Presicce

Models of Access Control Policies specified with graphs and graph transformation rules combine an intuitive visual representation with solid semantical foundations. While the expressive power of graph transformations leads in general to undecidable models, we prove that it is possible, with reasonable restrictions on the form of the rules, to obtain access control models where safety is decidab...

2001
Kenichi Kourai Shigeru Chiba

Internet servers are always in danger of being “hijacked” by various attacks like the buffer overflow attack. To minimize damages in cases where full control of the servers are stolen, imposing access restrictions on the servers is still needed. However, designing a secure access control mechanism against hijacking is not easy because that mechanism itself can be a security hole. In this paper,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید