Sciweavers

1688 search results - page 73 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
TRUST
2009
Springer
15 years 11 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
GG
2004
Springer
15 years 10 months ago
A Perspective on Graphs and Access Control Models
There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying ...
Ravi S. Sandhu
RAID
1999
Springer
15 years 8 months ago
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs
Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of informati...
John Kelsey, Bruce Schneier
TON
2012
13 years 7 months ago
Opportunistic Spectrum Access in Multiple-Primary-User Environments Under the Packet Collision Constraint
—Cognitive Radio (CR) technology has great potential to alleviate spectrum scarcity in wireless communications. It allows secondary users (SUs) to opportunistically access spectr...
Eric Jung, Xin Liu
CIA
1998
Springer
15 years 8 months ago
Multiagent Systems in Information-Rich Environments
Information-rich environments are the open environments that characterize most of the modern applications of computing technology. The applications include ubiquitous information a...
Michael N. Huhns, Munindar P. Singh