Sciweavers

2009 search results - page 10 / 402
» A privacy-aware access control system
Sort
View
ACSW
2004
13 years 9 months ago
A Case Study in Access Control Requirements for a Health Information System
We present a detailed examination of the access constraints for a small real-world Health Information System with the aim of achieving minimal access rights for each of the involv...
Mark Evered, Serge Bögeholz
COMCOM
2008
143views more  COMCOM 2008»
13 years 7 months ago
Cross-layer rate control, medium access control and routing design in cooperative VANET
In this paper, we address the rate control, the Medium Access Control (MAC) and the routing problem for cooperative Vehicular Ad-Hoc Network (VANET) in the framework of cross-laye...
Liang Zhou, Baoyu Zheng, Benoit Geller, Anne Wei, ...
INFOCOM
2010
IEEE
13 years 6 months ago
Distributed Power Control for Cognitive User Access based on Primary Link Control Feedback
—We venture beyond the “listen-before-talk” strategy that is common in many traditional cognitive radio access schemes. We exploit the bi-directional nature of most primary c...
Senhua Huang, Xin Liu, Zhi Ding
ICDE
2003
IEEE
162views Database» more  ICDE 2003»
14 years 8 months ago
Dynamic Access Control Framework Based On Events
Access Control policies in e-commerce domain can be quite complex, affecting the response time provided to the users. We describe an event-based access control system that can pot...
Manish Bhide, Sandeep Pandey, Ajay Gupta 0004, Muk...
LICS
2003
IEEE
14 years 23 days ago
Logic in Access Control
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and ...
Martín Abadi