Sciweavers

640 search results - page 48 / 128
» Access Control for Active Spaces
Sort
View
ENTCS
2007
140views more  ENTCS 2007»
13 years 8 months ago
Secured Information Flow for Asynchronous Sequential Processes
We present in this article a precise security model for data confidentiality in the framework of ASP (Asynchronous Sequential Processes). ASP is based on active objects, asynchro...
Isabelle Attali, Denis Caromel, Ludovic Henrio, Fe...
ICRA
2002
IEEE
167views Robotics» more  ICRA 2002»
14 years 1 months ago
Coordinated Teams of Reactive Mobile Platforms
This paper presents techniques for exploiting redundancy in teams of mobile robots. In particular, we address tasks involving the kinematic coordination of several communicating r...
John Sweeney, T. J. Brunette, Yunlei Yang, Roderic...
TC
2001
13 years 10 months ago
The information integrity imperative
The paper first develops the core IS view of business activity, which comprises informational and physical work systems and central to which is the informational work system deliv...
Madhavan K. Nayar
ACSAC
2001
IEEE
14 years 14 days ago
Detecting Conflicts in a Role-Based Delegation Model
The RBAC96 access control model has been the basis for extensive work on role-based constraint specification and role-based delegation. However, these practical extensions can als...
Andreas Schaad
ICN
2009
Springer
14 years 3 months ago
Acquisition of Channel State Information for Routing Purposes in Relay-Based WiMAX Networks
— The paper focuses on multi-hop routing mechanism used in relay based WiMAX networks. The proposal how to acquire channel state information (CSI) on relay and access path for de...
Pavel Mach, Zdenek Becvar, Robert Bestak