• Aucun résultat trouvé

[PDF] Top 20 Trusted Access Control System for Smart Campus

Has 10000 "Trusted Access Control System for Smart Campus" found on our website. Below are the top 20 most common "Trusted Access Control System for Smart Campus".

Trusted Access Control System for Smart Campus

Trusted Access Control System for Smart Campus

... the trusted bind between an identity and a public ...the trusted third-party, but some issues arise with the need to verify if a certificate has been revoked, especially in a context of an embedded ... Voir le document complet

8

Trusted Collaborative Real Time Scheduling in a Smart Card Exokernel

Trusted Collaborative Real Time Scheduling in a Smart Card Exokernel

... a smart card. Random Access Memory is used as a working space by the system and the ...operating system which usually does not change after having been loaded on the ...space for data ... Voir le document complet

19

An Access Control Model Based Testing Approach for Smart Card Applications: Results of the {POSÉ} Project

An Access Control Model Based Testing Approach for Smart Card Applications: Results of the {POSÉ} Project

... tests. For each ab- stract security test, we compute only one valuation of the functional parameters, so one functional security parameter is computed per ab- stract security ...generated for the ... Voir le document complet

18

Tuple-Based Access Control: a Provenance-Based Information Flow Control for Relational Data

Tuple-Based Access Control: a Provenance-Based Information Flow Control for Relational Data

... issue for access control ...be trusted by all users in the system, it is not the case for communication ...policy for who can ... Voir le document complet

11

A Card-less TEE-Based Solution for Trusted Access Control

A Card-less TEE-Based Solution for Trusted Access Control

... global smart campus project called neoCampus that aims at designing a modern and green campus thanks to a va- riety of new sensors and ...to access various services. For instance, to ... Voir le document complet

7

Scalable and Privacy-Preserving Admission Control for Smart Grids

Scalable and Privacy-Preserving Admission Control for Smart Grids

... Moreover, for any value of q we can achieve the same efficiency by selecting (n, p) on the corresponding ...our control mechanism is not very sensitive neither to the pair (n, p) (as long as it is a point ... Voir le document complet

30

Session Types for Access and Information Flow Control

Session Types for Access and Information Flow Control

... and access con- trol, since a declassified value may only be received by a participant whose level is greater than or equal to the original level of the ...the access control policy, as in ... Voir le document complet

49

Access control lists for the self-certifying filesystem

Access control lists for the self-certifying filesystem

... This thesis has demonstrated that the existing SFS infrastructure can be used to create a powerful, yet easy-to-use access control mechanism, which is well suited [r] ... Voir le document complet

45

Smart co-phasing system for segmented mirror telescopes

Smart co-phasing system for segmented mirror telescopes

... The system speed and precision could still be improved using high speed camera and optimized ...this system has advantages but additional assessment must be performed to validate it for the case of a ... Voir le document complet

1

Energy optimization and management of demand response interactions in a smart campus

Energy optimization and management of demand response interactions in a smart campus

... to. For example, the energy production generated by PV units or power demanded by EVs can be lower than ...expected. For this reason, the EMS pushes field devices schedules to a group of controllers that ... Voir le document complet

20

Context-Aware Access Control for RDF Graph Stores

Context-Aware Access Control for RDF Graph Stores

... without access control. When executed against the Access Control Manager, the test SPARQL query is associated to the mobile context described in Figure ...one Access Condition. In ... Voir le document complet

7

Client-Based Access Control Management for XML documents

Client-Based Access Control Management for XML documents

... Access control Figure 2. Abstract target architecture 3 Streaming the access control While several access control models for XML have been proposed recently, few papers ... Voir le document complet

28

Adaptive monitoring system for e-health smart homes

Adaptive monitoring system for e-health smart homes

... in smart environments and e-Health in ...management system for health monitoring and alarm management of chronic conditions in a home-based care scenario ...approach for analyzing measurement ... Voir le document complet

24

Assisted Policy Management for SPARQL Endpoints Access Control

Assisted Policy Management for SPARQL Endpoints Access Control

... an access control framework for querying Web of Data ...pre-defined access policies against client attributes sent with the ...context-aware access control policies, by hiding ... Voir le document complet

5

Teletraffic Engineering for Direct Load Control in Smart Grids

Teletraffic Engineering for Direct Load Control in Smart Grids

... the system will in general require a lower utilization of the resources to satisfy the ...and control overheads through a particular choice of the parameter ...increase control overheads because the ... Voir le document complet

24

Autonomous smart white cane navigation system for indoor usage

Autonomous smart white cane navigation system for indoor usage

... problem for this segment of people, we have proposed a smart white cane to help blinds in indoor ...This system contains micro-controllers, cameras and accelerometers and can send audio ...our ... Voir le document complet

17

Health indicator construction for system health assessment in smart manufacturing

Health indicator construction for system health assessment in smart manufacturing

... the system to identify the critical components leading to the system failure ...model for fault detection and diagnostics (FDD) of the studied ... Voir le document complet

7

Towards a portable smart spatial exploration system for environment perception

Towards a portable smart spatial exploration system for environment perception

... first system prototype A first (non-integrated) prototype has been developed to showcase the system functionality and validate its consistency with a subset of the users’ ...designed for the INSPEX ... Voir le document complet

5

Securing a trusted hardware environment (Trusted Execution Environment)

Securing a trusted hardware environment (Trusted Execution Environment)

... the access to the scan chains possible with the JTAG wrappers are not implemented in the reference board of the TEEVA project, or at least there is no connection with this access ...required for ... Voir le document complet

129

Expert System for topological remedial action discovery in smart grids

Expert System for topological remedial action discovery in smart grids

... of smart grids, new flexibilities are needed for congestion management to handle new power flow dy- namics without expanding the grid with heavy ...topology. For TSOs who own and operate their grid, ... Voir le document complet

7

Show all 10000 documents...