Sciweavers

1688 search results - page 66 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
ACSAC
1998
IEEE
15 years 8 months ago
Role-Based Access Control Framework for Network Enterprises
A business's success depends on its ability to protect valuable business assets in an increasingly hostile environment. Protecting information requires a cost, not only in pu...
D. J. Thomsen, D. O'Brien, J. Bogle
IJSNET
2006
131views more  IJSNET 2006»
15 years 4 months ago
Medium access control with mobility-adaptive mechanisms for wireless sensor networks
: Mobility in wireless sensor networks poses unique challenges to the medium access control (MAC) protocol design. Previous MAC protocols for sensor networks assume static sensor n...
Muneeb Ali, Zartash Afzal Uzmi
MDA
1999
Springer
179views Communications» more  MDA 1999»
15 years 8 months ago
Cache Coherency in Location-Dependent Information Services for Mobile Environment
Abstract. Caching frequently accessed data at the client is an attractive technique for improving access time. In a mobile computing environment, client location becomes a piece of...
Jianliang Xu, Xueyan Tang, Dik Lun Lee, Qinglong H...
IMC
2006
ACM
15 years 10 months ago
The need for cross-layer information in access point selection algorithms
The low price of commodity wireless LAN cards and access points (APs) has resulted in the rich proliferation of high density WLANs in enterprise, academic environments, and public ...
Karthikeyan Sundaresan, Konstantina Papagiannaki
CSREASAM
2006
15 years 5 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin