Sciweavers

1140 search results - page 106 / 228
» A Purpose-Based Access Control Model
Sort
View
ENGL
2007
94views more  ENGL 2007»
13 years 8 months ago
Development of a Functional Neuromuscular Stimulation System for Independent Ambulation of Patients with a Spinal Cord Injury
— This paper proposes the use of a controlled assistive device, aimed as a support for the impaired individuals to allow a limited ambulatory function. The aim of the overall pro...
Alejandro Garcia Blanco, Gildardo Jimenez, Pedro O...
CCS
2007
ACM
14 years 2 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
CCS
2010
ACM
14 years 2 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
RBAC
1998
101views more  RBAC 1998»
13 years 9 months ago
An Oracle Implementation of the PRA97 Model for Permission-Role Assignment
In role-based access control RBAC permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. Using RBAC ...
Ravi S. Sandhu, Venkata Bhamidipati
WOWMOM
2000
ACM
96views Multimedia» more  WOWMOM 2000»
14 years 12 days ago
An integrated mobility and traffic model for resource allocation in wireless networks
In a wireless communications network, the movement of mobile users presents significant technical challenges to providing efficient access to the wired broadband network. In this ...
Hisashi Kobayashi, Shun-Zheng Yu, Brian L. Mark