Sciweavers

706 search results - page 18 / 142
» Access Control: Policies, Models, and Mechanisms
Sort
View
JCS
2008
88views more  JCS 2008»
13 years 7 months ago
A privacy-aware access control system
The protection of privacy is an increasing concern in our networked society because of the growing amount of personal information that is being collected by a number of commercial...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
ACSAC
2002
IEEE
14 years 15 days ago
A Model for Attribute-Based User-Role Assignment
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles, based on a specific enterprise policy, thereby authorizing them to ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu
DASFAA
2007
IEEE
188views Database» more  DASFAA 2007»
14 years 1 months ago
Security-Conscious XML Indexing
To support secure exchanging and sharing of XML data over the Internet, a myriad of XML access control mechanisms have been proposed. In the setting of node-level fine-grained acc...
Yan Xiao, Bo Luo, Dongwon Lee
SACMAT
2011
ACM
12 years 10 months ago
Anomaly discovery and resolution in web access control policies
The advent of emerging technologies such as Web services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effec...
Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni
TWC
2008
98views more  TWC 2008»
13 years 7 months ago
On bandwidth request mechanism with piggyback in fixed IEEE 802.16 networks
This paper investigates the random channel access mechanism specified in the IEEE 802.16 standard for the uplink traffic in a Point-to-MultiPoint (PMP) network architecture. An ana...
Jianhua He, Kun Yang, Ken Guild, Hsiao-Hwa Chen