Sciweavers

534 search results - page 22 / 107
» Aggregating and Deploying Network Access Control Policies
Sort
View
PIMRC
2010
IEEE
13 years 5 months ago
Downlink capacity of two-tier cognitive femto networks
Abstract--In two-tier networks consisting of a macrocell overlaid with femtocells in co-channel deployment and closed-access policy, spatial reuse is achieved at the price of sever...
Shin-Ming Cheng, Weng-Chon Ao, Kwang-Cheng Chen
SACMAT
2003
ACM
14 years 19 days ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
SACMAT
2006
ACM
14 years 1 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
BELL
2002
86views more  BELL 2002»
13 years 7 months ago
Middleboxes: Controllable media firewalls
Internet technology is promised to provide the broadband multi-service future. Today this technology can not provide basic quality guarantees for the services rendered. Generally ...
Paul Sijben, Willem van Willigenburg, Michel de Bo...
IEEEARES
2007
IEEE
14 years 1 months ago
A Near-Real-Time Behaviour Control Framework
The NuBric behaviour control framework (BCF) is a near-real-time framework written entirely in Java based on the paradigms of both role based access control (RBAC) and policy base...
Bastian Preindl, Alexander Schatten