Sciweavers

1140 search results - page 88 / 228
» A Purpose-Based Access Control Model
Sort
View
ICDCSW
2009
IEEE
13 years 5 months ago
Performance Analysis of WiMedia UWB MAC
Ultra Wide Band (UWB) technologies have attracted a lot of attention recently due to their large bandwidth and low emission, which are suitable for in-door, high-speed multimedia c...
Rukhsana Ruby, Jianping Pan
EURONGI
2006
Springer
13 years 11 months ago
Framework for Resource Allocation in Heterogeneous Wireless Networks Using Game Theory
This is a framework for resource allocation in a heterogeneous system composed of various access networks, for instance Third Generation wireless networks (3G) and WLAN, in the pre...
Mariana Dirani, Tijani Chahed
ACSAC
2002
IEEE
14 years 1 months ago
A Model for Attribute-Based User-Role Assignment
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles, based on a specific enterprise policy, thereby authorizing them to ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu
IAJIT
2010
133views more  IAJIT 2010»
13 years 6 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa
EMSOFT
2006
Springer
13 years 11 months ago
Modeling a system controller for timing analysis
Upper bounds on worst-case execution times, which are commonly called WCET, are a prerequisite for validating the temporal correctness of tasks in a real-time system. Due to the e...
Stephan Thesing