Sciweavers

97 search results - page 6 / 20
» A Network Access Control Approach Based on the AAA Architect...
Sort
View
ICOIN
2004
Springer
14 years 1 months ago
On Layered VPN Architecture for Enabling User-Based Multiply Associated VPNs
Abstract. In our previous work, we have proposed a new VPN architecture for enabling user-based multiply associated VPNs [1]. Almost all existing VPN technologies assume that users...
Yoshihiro Hara, Hiroyuki Ohsaki, Makoto Imase, Yos...
COMCOM
2008
138views more  COMCOM 2008»
13 years 8 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
CDC
2008
IEEE
128views Control Systems» more  CDC 2008»
14 years 3 months ago
Time-robust discrete control over networked Loosely Time-Triggered Architectures
In this paper we consider Loosely Time-Triggered Architectures (LTTA) as a networked infrastructure for deploying discrete control. LTTA are distributed architectures in which 1/ ...
Paul Caspi, Albert Benveniste
DBSEC
2003
155views Database» more  DBSEC 2003»
13 years 10 months ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
SACMAT
2010
ACM
14 years 1 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam