Sciweavers

828 search results - page 28 / 166
» Access Control in Location-Based Services
Sort
View
ICARCV
2006
IEEE
230views Robotics» more  ICARCV 2006»
14 years 3 months ago
A Biometric Approach to Linux Login Access Control
— Login access control refers to securing the entry point to a computing system. The login system is responsible for this service and must provide a number of tasks, the main tas...
Adam J. Gandossi, Wanquan Liu, Ronny Tjahyadi
INFOCOM
2006
IEEE
14 years 3 months ago
Performance Analysis of Contention Based Medium Access Control Protocols
—This paper studies the performance of contention based medium access control (MAC) protocols. In particular, a simple and accurate technique for estimating the throughput of the...
Gaurav Sharma, Ayalvadi J. Ganesh, Peter B. Key
SEMWEB
2007
Springer
14 years 3 months ago
Enabling Advanced and Context-Dependent Access Control in RDF Stores
Semantic Web databases allow efficient storage and access to RDF statements. Applications are able to use expressive query languages in order to retrieve relevant metadata to perfo...
Fabian Abel, Juri Luca De Coi, Nicola Henze, Arne ...
DPD
2007
100views more  DPD 2007»
13 years 9 months ago
Sharing hierarchical context for mobile web services
Context has the potential to enhance Web services in mobile environments to a great extent. Yet, challenges such as bandwidth restriction or dynamic changes require considerations ...
Christoph Dorn, Schahram Dustdar
COMGEO
2010
ACM
14 years 1 months ago
Access control systems for spatial data infrastructures and their administration
Today sophisticated concepts, languages and frameworks exist, that allow implementing powerful fine grained access control systems for protecting Web Services and spatial data in ...
Jan Herrmann