Sciweavers

653 search results - page 35 / 131
» Addressing interoperability issues in access control models
Sort
View
INFOCOM
2005
IEEE
14 years 1 months ago
Designing wireless radio access networks for third generation cellular networks
— In third generation (3G) cellular networks, base stations are connected to base station controllers by pointto-point (usually T1/E1) links. However, today’s T1/E1 based backh...
Tian Bu, Mun Choon Chan, Ramachandran Ramjee
SUTC
2008
IEEE
14 years 2 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
CAI
2006
Springer
13 years 8 months ago
Formal Verification of Security Model Using SPR Tool
In this paper, formal verification methodologies and the SPR (Safety Problem Resolver) model checking tool are used for verifying a security model's safety. The SPR tool makes...
Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D....
CSREAEEE
2006
110views Business» more  CSREAEEE 2006»
13 years 9 months ago
Network-in Quality the E-Business
Recent advances in user access technology enables the delivery of Network multicast to residential users. In order for such a service to be successful, efficient management must b...
Kaiquan Chen
ISCAS
2003
IEEE
99views Hardware» more  ISCAS 2003»
14 years 1 months ago
Time-delay modelling for multi-layer power systems
Modelling of multi-layer power system interactions will become increasingly important as market mechanisms and feedback controls become more tightly coupled into the physical syst...
Ian A. Hiskens