Sciweavers

307 search results - page 9 / 62
» A Network Access Control Mechanism Based on Behavior Profile...
Sort
View
SASN
2006
ACM
14 years 1 months ago
Inverting sensor networks and actuating the environment for spatio-temporal access control
Wireless sensor networks are typically deployed to measure the information field, rather than create an information field. However, by utilizing the radio on sensor nodes, it is...
Shu Chen, Yu Zhang, Wade Trappe
DBSEC
2010
126views Database» more  DBSEC 2010»
13 years 9 months ago
Mining Likely Properties of Access Control Policies via Association Rule Mining
Abstract. Access control mechanisms are used to control which principals (such as users or processes) have access to which resources based on access control policies. To ensure the...
JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altuna...
SASO
2008
IEEE
14 years 2 months ago
Self-Organizing Dynamic Ad Hoc Grids
Resource management for ad hoc grids is challenging due to the participation of heterogeneous, dynamic, autonomous and ephemeral nodes. Different underlying network infrastructure...
Tariq Abdullah, Vassiliy Sokolov, Behnaz Pourebrah...
SASO
2008
IEEE
14 years 2 months ago
An Infection-Based Mechanism for Self-Adaptation in Multi-agent Complex Networks
Distributed mechanisms that regulate the behavior of autonomous agents in open multi-agent systems (MAS) are of high interest since we cannot employ centralized approaches relying...
Norman Salazar, Juan A. Rodríguez-Aguilar, ...
CSREASAM
2006
13 years 9 months ago
Role Based Access Control and the JXTA Peer-to-Peer Framework
Role based access control (RBAC) allows users access to resources based on their competencies and responsibilities within an organization. Typically, RBAC is provided as a securit...
Amit Mathur, Suneuy Kim, Mark Stamp