Sciweavers

3274 search results - page 40 / 655
» Access Support in Object Bases
Sort
View
WETICE
1997
IEEE
14 years 1 months ago
How Role Based Access Control is Implemented in SESAME
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work ...
Mark Vandenwauver, René Govaerts, Joos Vand...
SIS
2008
13 years 10 months ago
An Access Control Model for Location based Services
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
Cameron Ross Dunne, Thibault Candebat, David Gray
TWC
2011
275views more  TWC 2011»
13 years 4 months ago
A Novel Uplink Multiple Access Scheme Based on TDS-FDMA
—This contribution proposes a novel time-domain synchronous frequency division multiple access (TDS-FDMA) scheme to support multi-user uplink application. A unified frame struct...
Linglong Dai, Zhaocheng Wang, Sheng Chen
ICWS
2007
IEEE
13 years 10 months ago
A Situation-aware Access Control based Privacy-Preserving Service Matchmaking Approach for Service-Oriented Architecture
Service matchmaking is an important process in the operation of Service-Oriented Architecture (SOA) based systems. In this process, information from both service providers and req...
Stephen S. Yau, Junwei Liu
GLOBECOM
2006
IEEE
14 years 3 months ago
Distributed Medium Access Control in Pulse-Based Time-Hopping UWB Wireless Networks
— This paper investigates distributed medium access control (MAC) to achieve rate guarantee in pulse-based timehopping ultra-wideband (UWB) wireless networks, where the inherent ...
Hai Jiang, Kuang-Hao Liu, Weihua Zhuang, Xuemin Sh...