Sciweavers

1140 search results - page 150 / 228
» A Purpose-Based Access Control Model
Sort
View
MM
2004
ACM
145views Multimedia» more  MM 2004»
14 years 1 months ago
Proportional service differentiation in wireless LANs using spacing-based channel occupancy regulation
In this paper, we propose Spacing-based Channel Occupancy Regulation (SCORE) MAC protocol that provides proportional service differentiation in terms of normalized throughput in w...
Qi Xue, Aura Ganz
COOPIS
2003
IEEE
14 years 1 months ago
Implementation Experience with OMG's SCIOP Mapping
Longevity of distributed computing middleware standards, such as CORBA, depend on their ability to support a range of applications by providing low overhead access in a uniform man...
Gautam H. Thaker, Patrick J. Lardieri, Chuck Winte...
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
14 years 5 days ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
SEC
2007
13 years 9 months ago
Building a Distributed Semantic-aware Security Architecture
Enhancing the service-oriented architecture paradigm with semantic components is a new field of research and goal of many ongoing projects. The results lead to more powerful web a...
Jan Kolter, Rolf Schillinger, Günther Pernul
IADIS
2004
13 years 9 months ago
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI
We have designed and deployed a system that uses X.509 public-key certificates (PKC) and attribute certificates (AC) for access control. This includes an authorization service for...
Diana Berbecaru, Antonio Lioy