Sciweavers

2009 search results - page 273 / 402
» A privacy-aware access control system
Sort
View
INFOCOM
2008
IEEE
14 years 4 months ago
Modeling Resource Sharing Dynamics of VoIP Users over a WLAN Using a Game-Theoretic Approach
—We consider a scenario in which users share an access point and are mainly interested in VoIP applications. Each user is allowed to adapt to varying network conditions by choosi...
Edson H. Watanabe, Daniel S. Menasché, Edmu...
NETWORKING
2000
13 years 11 months ago
Fairness and Aggregation: A Primal Decomposition Study
Abstract. We examine the fair allocation of capacity to a large population of best-effort connections in a typical multiple access communication system supporting some bandwidth on...
André Girard, Catherine Rosenberg, Mohammed...
CAISE
2010
Springer
13 years 10 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
WWW
2008
ACM
14 years 11 months ago
Privacy-enhanced sharing of personal content on the web
Publishing personal content on the web is gaining increased popularity with dramatic growth in social networking websites, and availability of cheap personal domain names and host...
Mohammad Mannan, Paul C. van Oorschot
MSWIM
2005
ACM
14 years 3 months ago
An analytical model of the virtual collision handler of 802.11e
A number of analytical models have been proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA pr...
Paal E. Engelstad, Olav N. Østerbø