Sciweavers

223 search results - page 16 / 45
» A Trust-Based Access Control Model for Pervasive Computing A...
Sort
View
ISORC
2008
IEEE
14 years 3 months ago
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
In this paper, a Role-based Access Control (RBAC) model is applied and extended to a multimedia version called Multi-Role Based Access Control (MRBAC), which can fully support the...
Na Zhao, Min Chen, Shu-Ching Chen, Mei-Ling Shyu
FGCN
2008
IEEE
152views Communications» more  FGCN 2008»
13 years 10 months ago
Extending the UbiMDR Supporting Situation-Aware Access Control
Ubiquitous computing environment requirement needs information sharing of sensors based on sensor network technology, situation-aware and determination functions and other related...
Jeong-Dong Kim, Dongwon Jeong, Doo-Kwon Baik
ICDCS
2006
IEEE
14 years 2 months ago
Dynamic Access Control in a Content-based Publish/Subscribe System with Delivery Guarantees
Content-based publish/subscribe (pub/sub) is a promising paradigm for building asynchronous distributed applications. In many application scenarios, these systems are required to ...
Yuanyuan Zhao, Daniel C. Sturman
DEON
2008
Springer
13 years 10 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
NDSS
2003
IEEE
14 years 1 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet