Sciweavers

706 search results - page 76 / 142
» Access Control: Policies, Models, and Mechanisms
Sort
View
CSREASAM
2008
13 years 10 months ago
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing
Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control ...
Danfeng Yao
INFOCOM
1994
IEEE
14 years 29 days ago
Any Work-Conserving Policy Stabilizes the Ring with Spatial Reuse
We consider the ring network with spatial reuse. Tra c streams may enter and exit the network at any node. We adopt an arrival tra c model with deterministic constraints on its sa...
Leandros Tassiulas, Leonidas Georgiadis
ISCA
2010
IEEE
239views Hardware» more  ISCA 2010»
14 years 1 months ago
Sentry: light-weight auxiliary memory access control
Light-weight, flexible access control, which allows software to regulate reads and writes to any granularity of memory region, can help improve the reliability of today’s multi...
Arrvindh Shriraman, Sandhya Dwarkadas
SERP
2010
13 years 6 months ago
Role Explosion: Acknowledging the Problem
- In large enterprises subject to constant employee turnover and challenging security policies, the administration of Role-based Access Control (RBAC) is a daunting task that is of...
Aaron Elliott, Scott Knight
CCS
2008
ACM
13 years 11 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...