Sciweavers

357 search results - page 40 / 72
» A logic-based framework for attribute based access control
Sort
View
ACSAC
2009
IEEE
14 years 2 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...
TWC
2008
225views more  TWC 2008»
13 years 7 months ago
Joint rate and power allocation for cognitive radios in dynamic spectrum access environment
Abstract--We investigate the dynamic spectrum sharing problem among primary and secondary users in a cognitive radio network. We consider the scenario where primary users exhibit o...
Dong In Kim, Long Le, Ekram Hossain
CCS
2005
ACM
14 years 1 months ago
Secure collaboration in mediator-free environments
The internet and related technologies have made multidomain collaborations a reality. Collaboration enables domains to effectively share resources; however it introduces several ...
Mohamed Shehab, Elisa Bertino, Arif Ghafoor
SACMAT
2006
ACM
14 years 1 months ago
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...
James B. D. Joshi, Elisa Bertino
MOBIHOC
2008
ACM
14 years 7 months ago
Efficient configuration and control of sanets using facts
ization of domain-specific programming abstractions for wireless sensor actor networks can greatly ease application development. A high level of abstraction from underlying system...
Kirsten Terfloth, Jochen H. Schiller