Sciweavers

2009 search results - page 276 / 402
» A privacy-aware access control system
Sort
View
ICSE
2007
IEEE-ACM
14 years 10 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...
GLOBECOM
2008
IEEE
14 years 4 months ago
A Secure VANET MAC Protocol for DSRC Applications
— Vehicular ad hoc networking is an important component of Intelligent Transportation Systems. The main benefit of vehicular ad hoc network (VANET) communication is seen in activ...
Yi Qian, Kejie Lu, Nader Moayeri
ICC
2008
IEEE
152views Communications» more  ICC 2008»
14 years 4 months ago
MAC Performance of a 3GPP-LTE Multihop Cellular Network
— Multihop cellular networks offer increased coverage and capacity compared to singlehop cells of the same size. This is not as huge as using more base stations (BS) instead of w...
Rainer Schoenen, Rüdiger Halfmann, Bernhard W...
RTAS
2008
IEEE
14 years 4 months ago
WCET Analysis for Multi-Core Processors with Shared L2 Instruction Caches
Multi-core chips have been increasingly adopted by microprocessor industry. For real-time systems to safely harness the potential of multi-core computing, designers must be able t...
Jun Yan, Wei Zhang
NBIS
2007
Springer
14 years 4 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim