Sciweavers

828 search results - page 29 / 166
» Access Control in Location-Based Services
Sort
View
TIFS
2010
130views more  TIFS 2010»
13 years 4 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
TELSYS
2002
104views more  TELSYS 2002»
13 years 9 months ago
Quality of Service Management in GPRS-Based Radio Access Networks
Abstract. In this article, the performance and capacity gain achievable with quality of service (QoS) management in packet switched radio networks based on the General Packet Radio...
Peter Stuckmann
CASSIS
2005
Springer
14 years 3 months ago
The Architecture of a Privacy-Aware Access Control Decision Component
Today many interactions are carried out online through Web sites and e-services and often private and/or sensitive information is required by service providers. A growing concern r...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
SWS
2004
ACM
14 years 3 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
FTDCS
2004
IEEE
14 years 1 months ago
Towards Supporting Fine-Grained Access Control for Grid Resources
The heterogeneous nature and independent administration of geographically dispersed resources in Grid, demand the need for access control using fine-grained policies. In this pape...
Elisa Bertino, Pietro Mazzoleni, Bruno Crispo, Swa...