Sciweavers

307 search results - page 8 / 62
» A Network Access Control Mechanism Based on Behavior Profile...
Sort
View
IJNSEC
2010
145views more  IJNSEC 2010»
13 years 2 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
ISCC
2007
IEEE
130views Communications» more  ISCC 2007»
14 years 1 months ago
Pre-Authentication Based Enhancement for Access Control in Hybrid MANETs
We analyze the problem of reducing packet losses due to the authentication time which is required when an ad hoc node switches across different gateways in a mobile ad hoc network...
Rafael Marín López, Pedro M. Ruiz, F...
ICIS
2004
13 years 9 months ago
Alleviating Consumers' Privacy Concerns in Location-Based Services: A Psychological Control Perspective
Location-based services (LBS), enabled by advances in mobile and positioning technologies, have afforded users with a pervasive flexibility to be uniquely addressable and to acces...
Heng Xu, Hock-Hai Teo
ICISC
2004
127views Cryptology» more  ICISC 2004»
13 years 9 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
CCS
2009
ACM
14 years 8 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong