Sciweavers

1140 search results - page 145 / 228
» A Purpose-Based Access Control Model
Sort
View
CCS
2009
ACM
14 years 8 months ago
A conceptual framework for Group-Centric secure information sharing
In this paper, we propose a conceptual framework for developing a family of models for Group-Centric information sharing. The traditional approach to information sharing, characte...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
TELETRAFFIC
2007
Springer
14 years 2 months ago
Is ALOHA Causing Power Law Delays?
Abstract. Renewed interest in ALOHA-based Medium Access Control (MAC) protocols stems from their proposed applications to wireless ad hoc and sensor networks that require distribut...
Predrag R. Jelenkovic, Jian Tan
HICSS
2002
IEEE
119views Biometrics» more  HICSS 2002»
14 years 27 days ago
A New Buffer Management Scheme for Multimedia Terminals in Broadband Satellite Networks
In the recent years, there has been a growing interest in broadband satellite networks. Broadband satellite networks are designed to provide the required qualify of service (QoS) ...
Mahnoosh Mobasseri, Victor C. M. Leung
DBSEC
2004
170views Database» more  DBSEC 2004»
13 years 9 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
ARTQOS
2003
Springer
13 years 11 months ago
Differentiation and Interaction of Traffic: A Flow Level Study
We study what kind of differentiation can be achieved using DiffServ without admission control and using a relative services approach, i.e. the rate of the flow should be in propor...
Eeva Nyberg, Samuli Aalto