Sciweavers

579 search results - page 35 / 116
» Access control management for ubiquitous computing
Sort
View
CCS
2004
ACM
14 years 1 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
SACMAT
2003
ACM
14 years 1 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
ACSAC
2009
IEEE
14 years 2 hour ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
CCS
2004
ACM
14 years 1 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
APNOMS
2007
Springer
14 years 2 months ago
Providing Consistent Service Levels in IP Networks
Abstract. The use of Internet as an ubiquitous communication platform puts a strong demand on service providers regarding the assurance of multiple service levels consistently. Des...
Solange Rito Lima, Pedro Sousa, Paulo Carvalho