Sciweavers

366 search results - page 8 / 74
» Access Policy Design Supported by FCA Methods
Sort
View
CSFW
2010
IEEE
13 years 11 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
TIT
2008
65views more  TIT 2008»
13 years 7 months ago
Power-Efficient Resource Allocation for Time-Division Multiple Access Over Fading Channels
We investigate resource allocation policies for time-division multiple access (TDMA) over fading channels in the power-limited regime. For frequency-flat block-fading channels and ...
Xin Wang, Georgios B. Giannakis
ISCAS
2002
IEEE
139views Hardware» more  ISCAS 2002»
14 years 13 days ago
Mobility support for Bluetooth public access
Bluetooth technology offers the potential for low-cost, broadband wireless access for a range of mobile and portable devices. It can thus provide for ubiquitous computing across a...
A. Kansal, Uday B. Desai
WETICE
1996
IEEE
13 years 11 months ago
Role-based security for distributed object systems
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
Nicholas Yialelis, Emil Lupu, Morris Sloman
PERCOM
2009
ACM
14 years 2 months ago
Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments
—Ensuring spontaneous ad hoc interoperation in decentralized ubiquitous computing environments is challenging, because of heterogeneous resources and divergent policies. Centrali...
Venkatraman Ramakrishna, Peter L. Reiher, Leonard ...