Sciweavers

1140 search results - page 90 / 228
» A Purpose-Based Access Control Model
Sort
View
129
Voted
IADIS
2003
15 years 4 months ago
Integrating RBAC Mechanisms in a Web Server
Hypermedia systems (whether web sites or not) should support multilevel policiesm, offering different views and manipulation abilities of the same information to users with differ...
Daniel Sanz-García, Paloma Díaz, Ign...
ACJ
2006
85views more  ACJ 2006»
15 years 2 months ago
Tree Automata for Schema-Level Filtering of XML Associations
In this paper we present query filtering techniques based on bottom-up tree automata for XML access control. In our authorization model (RXACL), RDF statements are used to represen...
Vaibhav Gowadia, Csilla Farkas
153
Voted
WIOPT
2010
IEEE
15 years 1 months ago
Competitive interference-aware spectrum access in cognitive radio networks
—Cognitive radio networks provide the capability to share the wireless channel with licensed (primary) users in an opportunistic manner. Primary users have a license to operate i...
Jocelyne Elias, Fabio Martignon, Antonio Capone, E...
144
Voted
TMC
2008
210views more  TMC 2008»
15 years 2 months ago
Adaptive Cluster-Based Data Collection in Sensor Networks with Direct Sink Access
Recently wireless sensor networks featuring direct sink access have been studied as an efficient architecture to gather and process data for numerous applications. In this paper, w...
Mahdi Lotfinezhad, Ben Liang, Elvino S. Sousa
126
Voted
CCS
2010
ACM
15 years 1 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov