Sciweavers

1140 search results - page 199 / 228
» A Purpose-Based Access Control Model
Sort
View
SP
2006
IEEE
110views Security Privacy» more  SP 2006»
14 years 1 months ago
Privacy and Contextual Integrity: Framework and Applications
Contextual integrity is a conceptual framework for understanding privacy expectations and their implications developed in the literature on law, public policy, and political philo...
Adam Barth, Anupam Datta, John C. Mitchell, Helen ...
ADHOCNOW
2006
Springer
14 years 1 months ago
ROAR: A Multi-rate Opportunistic AODV Routing Protocol for Wireless Ad-Hoc Networks
In this paper, we outline a simple approach, called ROAR, that enables the Ad-Hoc On-Demand Distance Vector (AODV) routing protocol to strengthen its routes by recruiting neighbors...
Kwan Wu Chin, Darryn Lowe
MOBICOM
2006
ACM
14 years 1 months ago
A MAC protocol for ad-hoc underwater acoustic sensor networks
A medium access control (MAC) protocol is proposed that is suitable for non-synchronized ad-hoc networks, and in particular for the energy-constrained underwater acoustic networks...
Borja Peleato, Milica Stojanovic
SI3D
2006
ACM
14 years 1 months ago
ShowMotion: camera motion based 3D design review
We describe a new interactive system for 3D design review, built to exploit the visual perception cue of motion parallax, in order to enhance shape perception and aesthetic evalua...
Nicholas Burtnyk, Azam Khan, George W. Fitzmaurice...
ISORC
2005
IEEE
14 years 1 months ago
A GTRBAC Based System for Dynamic Workflow Composition and Management
In this paper, we propose an architecture for adaptive real-time workflow-based collaborative system. Such a system is needed to support real-time communication and sharing of inf...
Basit Shafiq, Arjmand Samuel, Halima Ghafoor