Sciweavers

1688 search results - page 68 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
NCA
2007
IEEE
15 years 10 months ago
FRAC: Implementing Role-Based Access Control for Network File Systems
We present FRAC, a Framework for Role-based Access Control in network file systems. FRAC is a reference monitor that controls the message flow between file system clients and s...
Aniruddha Bohra, Stephen Smaldone, Liviu Iftode
WPES
2004
ACM
15 years 10 months ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
AINA
2009
IEEE
15 years 9 months ago
Location-Aware Authentication and Access Control
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Elisa Bertino, Michael S. Kirkpatrick
IEEESCC
2005
IEEE
15 years 10 months ago
The Design and Implementation of Scalable Information Services in a Grid Environment
This paper proposes an Extensible Monitoring and Discovery Service for grid environment MASSIVE (MEMDS). The MASSIVE project focuses on developing a Multidisciplinary Applications...
Wei Wang 0005, Yao Zheng, Guanghua Song
PERCOM
2007
ACM
16 years 4 months ago
Dual Ownership: Access Management for Shared Item Information in RFID-enabled Supply Chains
RFID tags combined with globally unique numbering schemes such as the Electronic Product Code (EPC) help standardizing the communication along the supply chain. Participants gener...
Alexander Ilic, Florian Michahelles, Elgar Fleisch