Sciweavers

1587 search results - page 44 / 318
» Access Control for Shared Resources
Sort
View
CCS
1994
ACM
14 years 2 months ago
Application Access Control at Network Level
This paper describes an access control mechanism that enforces at the network level an access control decision that is taken at the application level. The mechanism is based on th...
Refik Molva, Erich Rütsche
VTC
2006
IEEE
14 years 3 months ago
The WINNER B3G System MAC Concept
— The European IST research projects WINNER and WINNER II aim at developing a single new ubiquitous radio access system concept that can be adapted for use in a wide variety of m...
Mikael Sternad, Tommy Svensson, Göran Klang
COMPSAC
2007
IEEE
14 years 1 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
JSAC
2007
157views more  JSAC 2007»
13 years 9 months ago
Network-aware P2P file sharing over the wireless mobile networks
— With the coming wireless mobile networks era and the popular use of P2P applications, how to improve the resource retrieval and discovery for P2P file sharing applications in ...
Chung-Ming Huang, Tz-Heng Hsu, Ming-Fa Hsu
GRID
2007
Springer
13 years 9 months ago
Managing Role-Based Access Control Policies for Grid Databases in OGSA-DAI Using CAS
In this paper, we present a role-based access control method for accessing databases through the Open Grid Services Architecture – Data Access and Integration (OGSA-DAI) framewor...
Anil L. Pereira, Vineela Muppavarapu, Soon M. Chun...