Sciweavers

579 search results - page 61 / 116
» Access control management for ubiquitous computing
Sort
View
PERCOM
2008
ACM
14 years 7 months ago
MyNet: A Platform for Secure P2P Personal and Social Networking Services
Recent advances in peer-to-peer (P2P) technologies will enable users to establish ubiquitous connectivity among their personal networked devices and those of others. Building on t...
Dimitris N. Kalofonos, Zoe Antoniou, Franklin Reyn...
IPPS
2008
IEEE
14 years 2 months ago
Scalable server provisioning with HOP-SCOTCH
The problem of provisioning servers in a cluster infrastructure includes the issues of coordinating access and sharing of physical resources, loading servers with the appropriate ...
David Daly, M. A. Silva, José E. Moreira
WCNC
2010
IEEE
13 years 11 months ago
Selection of Repetition Codes for MAC in Vehicular Ad Hoc Networks
—In the context of vehicular safety and entertainment applications, we focus on the design of a reliable medium access control scheme. Each vehicle is willing to form a network a...
Ali Honarvar, Shahrokh Valaee
CCS
2006
ACM
13 years 11 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
CCS
2007
ACM
14 years 2 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder