Sciweavers

223 search results - page 18 / 45
» A Trust-Based Access Control Model for Pervasive Computing A...
Sort
View
CN
2004
109views more  CN 2004»
13 years 8 months ago
Architectures and protocols for mobile computing applications: a reconfigurable approach
This work deals with reconfigurable control functions and protocols for supporting mobile computing applications in heterogeneous wireless systems like cellular networks and WLANs...
Carla-Fabiana Chiasserini, Francesca Cuomo, Leonar...
DEXAW
2003
IEEE
137views Database» more  DEXAW 2003»
14 years 1 months ago
Applying the Semantic Web Layers to Access Control
The Semantic Web, also known as the Web of meaning, is considered the new generation of the Web. Its objective is to enable computers and people to work in cooperation. A requisit...
Mariemma Inmaculada Yagüe del Valle, Antonio ...
MSWIM
2009
ACM
14 years 3 months ago
Medium access control for underwater acoustic sensor networks with MIMO links
The requirements of multimedia underwater monitoring applications with heterogeneous traffic demands in terms of bandwidth and end-to-end reliability are considered in this artic...
Li-Chung Kuo, Tommaso Melodia
CNIS
2006
13 years 10 months ago
STRBAC - An approach towards spatio-temporal role-based access control
The rapid emergence of GPS enabled devices, sensors and mobile equipment in commercial as well as government organizations has led to considerable research in time- and location-b...
Mahendra Kumar, Richard E. Newman
ACSAC
2002
IEEE
14 years 1 months ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...