Sciweavers

1688 search results - page 95 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
PC
2002
189views Management» more  PC 2002»
15 years 4 months ago
Data management and transfer in high-performance computational grid environments
An emerging class of data-intensive applications involve the geographically dispersed extraction of complex scientific information from very large collections of measured or compu...
William E. Allcock, Joseph Bester, John Bresnahan,...
POLICY
2007
Springer
15 years 10 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell
119
Voted
EUC
2007
Springer
15 years 10 months ago
Obligations for Privacy and Confidentiality in Distributed Transactions
Existing access control systems are typically unilateral in that the enterprise service provider assigns the access rights and makes the access control decisions, and there is no n...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
PERCOM
2003
ACM
16 years 4 months ago
MACA-P: A MAC for Concurrent Transmissions in Multi-Hop Wireless Networks
: This paper presents the initial design and performance study of MACA-P, a RTS/CTS based MAC protocol that enables simultaneous transmissions in multihop ad-hoc wireless networks....
Arup Acharya, Archan Misra, Sorav Bansal
154
Voted
ADHOC
2010
173views more  ADHOC 2010»
15 years 1 months ago
A new distributed topology control algorithm for wireless environments with non-uniform path loss and multipath propagation
Each node in a wireless multi-hop network can adjust the power level at which it transmits and thus change the topology of the network to save energy by choosing the neighbors wit...
Harish Sethu, Thomas Gerety