Sciweavers

1140 search results - page 121 / 228
» A Purpose-Based Access Control Model
Sort
View
140
Voted
ICC
2009
IEEE
118views Communications» more  ICC 2009»
15 years 16 days ago
Downlink Resource Allocation for OFDMA-Based Multiservice Networks with Imperfect CSI
Abstract--This paper addresses practical implementation issues of resource allocation in OFDMA networks: inaccuracy of channel state information (CSI) available to the resource all...
Mohamad Khattar Awad, Veluppillai Mahinthan, Mehri...
129
Voted
ECMDAFA
2008
Springer
97views Hardware» more  ECMDAFA 2008»
15 years 4 months ago
Model-Driven Security in Practice: An Industrial Experience
Abstract. In this paper we report on our experience on using the socalled model-driven security approach in an MDA industrial project. In model-driven security, "designers spe...
Manuel Clavel, Viviane da Silva, Christiano Braga,...
105
Voted
TGC
2005
Springer
15 years 8 months ago
A Practical Formal Model for Safety Analysis in Capability-Based Systems
Abstract. We present a formal system that models programmable abstractions for access control. Composite abstractions and patterns of arbitrary complexity are modeled as a configu...
Fred Spiessens, Peter Van Roy
131
Voted
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
15 years 7 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
GIS
2008
ACM
15 years 3 months ago
Towards a scalable model for location privacy
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up ne...
Nayot Poolsappasit, Indrakshi Ray