Sciweavers

1140 search results - page 40 / 228
» A Purpose-Based Access Control Model
Sort
View
IEEEMSP
2002
IEEE
166views Multimedia» more  IEEEMSP 2002»
14 years 22 days ago
Medium access control with channel state information for large sensor networks
Abstract—Traditionally, random access protocols have been designed and studied by assuming simple models for the physical layer. We introduce a reception model that incorporates ...
Srihari Adireddy, Lang Tong
DEXAW
1998
IEEE
94views Database» more  DEXAW 1998»
14 years 2 days ago
Towards Access Control for Logical Document Structures
This paper presents a first step towards a security model that defines access control for logical document structures. el benefits from roles to abstract from users and from secur...
Fredj Dridi, Gustaf Neumann
SACRYPT
2005
Springer
146views Cryptology» more  SACRYPT 2005»
14 years 1 months ago
An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security
In a hierarchical structure, an entity has access to another if and only if the former is a superior of the later. The access control scheme for a hierarchy represented by a partia...
Jiang Wu, Ruizhong Wei
SIGMOD
2006
ACM
124views Database» more  SIGMOD 2006»
14 years 8 months ago
Redundancy and information leakage in fine-grained access control
The current SQL standard for access control is coarse grained, in that it grants access to all rows of a table or none. Fine-grained access control, which allows control of access...
Govind Kabra, Ravishankar Ramamurthy, S. Sudarshan
JIIS
2002
118views more  JIIS 2002»
13 years 7 months ago
Authorization and Access Control of Application Data in Workflow Systems
: Workflow Management Systems (WfMSs) are used to support the modeling and coordinated execution of business processes within an organization or across organizational boundaries. A...
Shengli Wu, Amit P. Sheth, John A. Miller, Zongwei...