Sciweavers

670 search results - page 22 / 134
» A RBAC-Based Policy Information Base
Sort
View
TSP
2008
131views more  TSP 2008»
13 years 9 months ago
Smart Sleeping Policies for Energy Efficient Tracking in Sensor Networks
We study the problem of tracking an object that is moving randomly through a dense network of wireless sensors. We assume that each sensor has a limited range for detecting the pr...
Jason A. Fuemmeler, Venugopal V. Veeravalli
CSFW
2010
IEEE
14 years 1 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
FIW
2003
120views Communications» more  FIW 2003»
13 years 11 months ago
A Policy Architecture for Enhancing and Controlling Features
Abstract. Features provide extensions to a basic service, but in new systems users require much greater flexibility oriented towards their needs. Traditional features do not easil...
Stephan Reiff-Marganiec, Kenneth J. Turner
ISW
1997
Springer
14 years 2 months ago
A Framework for the Management of Information Security
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
Jussipekka Leiwo, Yuliang Zheng
TWC
2008
245views more  TWC 2008»
13 years 9 months ago
Cross-Layer Optimal Policies for Spatial Diversity Relaying in Mobile Ad Hoc Networks
In order to adapt to time-varying wireless channels, various channel-adaptive schemes have been proposed to exploit inherent spatial diversity in mobile/wireless ad hoc networks w...
Jing Ai, Alhussein A. Abouzeid, Zhenzhen Ye