We investigate the problem of efficient resource control for elastic traffic in IEEE 802.11e’s Enhanced Distributed Channel Access (EDCA) mechanism. Our approach considers an ...
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
This paper bears on the design and the quantitative evaluation of MAC mechanisms for wireless ad-hoc networks with performance guarantees. By this, we mean mechanisms where each ac...
: This paper proposes a context-aware security service providing multiple authentications and authorization from a Security Level which is decided dynamically in a context-aware en...
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...