Sciweavers

1140 search results - page 126 / 228
» A Purpose-Based Access Control Model
Sort
View
ACSAC
1998
IEEE
14 years 7 days ago
The RRA97 Model for Role-Based Administration of Role Hierarchies
Abstract Role-based access control RBAC has recently received a lot of attention due to its exibility, expressive power and simplicity in administration. In RBAC permissions are as...
Ravi S. Sandhu, Qamar Munawer
ITIIS
2008
151views more  ITIIS 2008»
13 years 8 months ago
Bandwidth Management of WiMAX Systems and Performance Modeling
WiMAX has been introduced as a competitive alternative for metropolitan broadband wireless access technologies. It is connection oriented and it can provide very high data rates, ...
Yue Li, Jianhua He, Weixi Xing
ICC
2009
IEEE
147views Communications» more  ICC 2009»
14 years 2 months ago
Distributed Quality-Lifetime Maximization in Wireless Video Sensor Networks
—Owing to the availability of low-cost and low-power CMOS cameras, Wireless Video Sensor Networks (WVSN) has recently become a reality. However video encoding is still a costly p...
Eren Gürses, Yuan Lin, Raouf Boutaba
ICRA
2007
IEEE
154views Robotics» more  ICRA 2007»
14 years 2 months ago
Identification of the payload inertial parameters of industrial manipulators
— In this paper we present four methods for the identification of the inertial parameters of the load of a manipulator. The knowledge of the values of these parameters can be use...
Wisama Khalil, Maxime Gautier, Philippe Lemoine
SIS
2007
13 years 9 months ago
A General Approach to Securely Querying XML
Access control models for XML data can be classified in two major categories: node filtering and query rewriting systems. The first category includes approaches that use access ...
Ernesto Damiani, Majirus Fansi, Alban Gabillon, St...