• Aucun résultat trouvé

[PDF] Top 20 A Card-less TEE-Based Solution for Trusted Access Control

Has 10000 "A Card-less TEE-Based Solution for Trusted Access Control" found on our website. Below are the top 20 most common "A Card-less TEE-Based Solution for Trusted Access Control".

A Card-less TEE-Based Solution for Trusted Access Control

A Card-less TEE-Based Solution for Trusted Access Control

... Secure Access Control, Trusted Execution Environments (TEE), Identity Based Encryption, ...present a new card-less access control system aiming to ... Voir le document complet

7

Reputation trust mechanism under the organizational-based access control model

Reputation trust mechanism under the organizational-based access control model

... provides a high level of precision. For this technique, we have obtained a precision more than ...0.6 for all the twelve possibilities (Figure 8 ...interesting for some particular ... Voir le document complet

17

Tuple-Based Access Control: a Provenance-Based Information Flow Control for Relational Data

Tuple-Based Access Control: a Provenance-Based Information Flow Control for Relational Data

... is a key issue for access control ...be trusted by all users in the system, it is not the case for communication ...services. A solution is to encrypt tuples ... Voir le document complet

11

Access Control for HTTP Operations on Linked Data

Access Control for HTTP Operations on Linked Data

... Abstract. Access control is a recognized open issue when interacting with RDF using HTTP ...basic access control lists, thus resulting in limited policy ...framework for SPARQL ... Voir le document complet

16

An Access Control Model for Web Databases

An Access Control Model for Web Databases

... he, for example, can submit an SQL injection ...our solution is that it enforces access control based on business application logic rather than primitive reads and ...writes. A ... Voir le document complet

9

PAbAC: a Privacy preserving Attribute based framework for fine grained Access Control in clouds

PAbAC: a Privacy preserving Attribute based framework for fine grained Access Control in clouds

... data access control, the key distribution remains a ...bottleneck. For instance, it becomes more complicated with the increase of the number of ...proposed a novel solution ... Voir le document complet

15

Trusted Access Control System for Smart Campus

Trusted Access Control System for Smart Campus

... source TEE implementation OP-TEE [18] is a Linaro [19] and STMicroelectronics project with the objective to release a totally virtualized and open source ...of a physical develop- ment ... Voir le document complet

8

The case for Access Control on XML relationships

The case for Access Control on XML relationships

... delivers a different view of the ...the access control policies of our motivating ...actually a mix of NA and RA rules (see Figure 5) are evaluated on documents ranging from 50Knode to ... Voir le document complet

24

A novel design and control solution for an aircraft sidestick actuator based on Halbach permanent magnet machine

A novel design and control solution for an aircraft sidestick actuator based on Halbach permanent magnet machine

... and control of a new sidestick actuators used to handle a civilian aircraft ...Indeed, a discrete robust adaptive sliding mode control for a new designed aircraft ... Voir le document complet

9

Trusted computing - A new challenge for embedded systems

Trusted computing - A new challenge for embedded systems

... memory. A monitor is used to protect the operating system ...is a need to track if a task does not reach any secure information not belonging to ...is a secret and stored in the secure zone, ... Voir le document complet

5

Study and Control of a Stepper Motor using an Arduino Card

Study and Control of a Stepper Motor using an Arduino Card

... under control. III.2.2.1 Open-Loop Control: An open-loop control system utilizes a controller or control actuator to obtain the desired response as Figure 2 ...open-loop control ... Voir le document complet

81

Towards a General Solution for Detecting Traffic Differentiation At the Internet Access

Towards a General Solution for Detecting Traffic Differentiation At the Internet Access

... In a previous work [17], we studied the responsiveness of routers to TTL-limited ...Through a large measurement campaign, we examined pos- sible bias in the Round-Trip Times of these probes and how ICMP ... Voir le document complet

10

A new access control unit for GANIL and SPIRAL 2

A new access control unit for GANIL and SPIRAL 2

... existing access control system for radiological controlled ...(access control unit) will be composed of a pair of PLC to ensure the safety of each ...by a system UGB ... Voir le document complet

4

Dynamic Cell-Less Radio Access Network Meta-Scheduler for High System Capacity Increase

Dynamic Cell-Less Radio Access Network Meta-Scheduler for High System Capacity Increase

... proposed solution is compatible with the most acknowledged schedulers in order to optimize spectrum usage in intra-cell domain while efficiently decreasing the interferences in multi- cell ...than a sum of ... Voir le document complet

10

A Genetic Algorithm Compared with a Gradient-Based Method for the Solution of an Active-Control Model Problem

A Genetic Algorithm Compared with a Gradient-Based Method for the Solution of an Active-Control Model Problem

... A Genetic Algorithm Compared with a Gradient-Based Method for the Solution of an Active-Control Model Problem Nathalie Marco, Cyril Godart, Jean-Antoine Desideri, Bertrand Mantel, Jacque[r] ... Voir le document complet

37

Database access control within a Java application

Database access control within a Java application

... designed for Java developers who were looking for ways to create applications that would interact with Oracle ...Components for Java (BC4J) framework and associated code ...using a combination ... Voir le document complet

8

A PROFILE-BASED ARCHITECTURE FOR A FLEXIBLE AND PERSONALIZED INFORMATION ACCESS

A PROFILE-BASED ARCHITECTURE FOR A FLEXIBLE AND PERSONALIZED INFORMATION ACCESS

... informed for a given ...in a profile according to the objective that it wants to ...of a given profile made up of several criteria not always all well informed, allows to keep the same profile ... Voir le document complet

6

A Punched Card System for Fire Endurance Ratings

A Punched Card System for Fire Endurance Ratings

... https://nrc-publications.canada.ca/eng/copyright Vous avez des questions? Nous pouvons vous aider. Pour communiquer directement avec un auteur, consultez la première page de la revue dans laquelle son article a ... Voir le document complet

9

A virtual curtain for the detection of humans and access control

A virtual curtain for the detection of humans and access control

... with a support vector machine classifier [18]. An SVM is a binary classifier that maps its input features into a high-dimensional non-linear subspace where a linear decision surface is ...with ... Voir le document complet

12

A Trusted Mechanised JavaScript Specification

A Trusted Mechanised JavaScript Specification

... like a traditional imperative programming lan- guage, leaves completely implicit three major aspects of the se- ...of a sub-expression diverges, then the parent expression will also ... Voir le document complet

15

Show all 10000 documents...