Sciweavers

828 search results - page 14 / 166
» Access Control in Location-Based Services
Sort
View
CCS
2010
ACM
13 years 10 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu
DNIS
2005
Springer
89views Database» more  DNIS 2005»
14 years 3 months ago
Policies, Models, and Languages for Access Control
Access control is the process of mediating every request to data and services maintained by a system and determining whether the request should be granted or denied. Expressiveness...
Sabrina De Capitani di Vimercati, Pierangela Samar...
IFIPTM
2010
204views Management» more  IFIPTM 2010»
13 years 8 months ago
xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement
Enforcing complex policies that span organizational domains is an open challenge. Current work on SOA policy enforcement splits security in logical components that can be distribut...
Gabriela Gheorghe, Stephan Neuhaus, Bruno Crispo
CNSR
2005
IEEE
14 years 3 months ago
Managing Access Control for Presence-Based Services
This paper presents an approach for managing access to services over presence-based communications based on the context of the situation. This paper addresses two technical challe...
Anand Dersingh, Ramiro Liscano, Allan G. Jost
ESAS
2006
Springer
14 years 1 months ago
Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks
The appliance of wireless sensor networks to a broad variety of applications doubtlessly requires end-user acceptance. End-users from various computer network unrelated disciplines...
Frederik Armknecht, Joao Girão, Marc Stoeck...