Sciweavers

1010 search results - page 167 / 202
» An Access Control Framework for Pervasive Computing Environm...
Sort
View
FQAS
1998
Springer
118views Database» more  FQAS 1998»
14 years 1 months ago
Partial Answers for Unavailable Data Sources
Abstract. Many heterogeneous database system products and prototypes exist today; they will soon be deployed in a wide variety of environments. Most existing systems suffer from an...
Philippe Bonnet, Anthony Tomasic
ACSAC
2002
IEEE
14 years 2 months ago
Thirty Years Later: Lessons from the Multics Security Evaluation
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
Paul A. Karger, Roger R. Schell
SIMUTOOLS
2008
13 years 10 months ago
An 802.16 model for NS2 simulator with an integrated QoS architecture
The IEEE 802.16 technology is emerging as a promising solution for BWA due to its ability to support multimedia services and to operate in multiple physical environments. Also, wi...
Ikbal Chammakhi Msadaa, Fethi Filali, Farouk Kamou...
ICC
2007
IEEE
131views Communications» more  ICC 2007»
14 years 3 months ago
Cooperative Resource Management in Cognitive Radio
Cognitive radio is generally understood as an intelligent wireless communication system aiming at the efficient utilization of radio resources. We argue for the extension of its sc...
Vuk Marojevic, Xavier Revés, Antoni Gelonch
OZCHI
2006
ACM
14 years 3 months ago
Beyond security: implications for the future of federated digital identity management systems
Federated identity management is often viewed by corporations as a solution to support secure online commerce by synthesising complex and fragmented user information into a single...
Christine Satchell, Graeme G. Shanks, Steve Howard...