Sciweavers

1010 search results - page 61 / 202
» An Access Control Framework for Pervasive Computing Environm...
Sort
View
136
Voted
SWS
2004
ACM
15 years 9 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
PERCOM
2006
ACM
16 years 3 months ago
Context-aware Provision of Advanced Internet Services
The pervasive and mobile computing scenario is characterized by the high heterogeneity of devices used to access services, and by frequent changes in the user's context. In t...
Raffaella Grieco, Delfina Malandrino, Francesca Ma...
MOBISYS
2007
ACM
16 years 3 months ago
MobiSteer: using steerable beam directional antenna for vehicular network access
In this work, we investigate the use of directional antennas and beam steering techniques to improve performance of 802.11 links in the context of communication between a moving v...
Vishnu Navda, Anand Prabhu Subramanian, Kannan Dha...
SACMAT
2003
ACM
15 years 9 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
EURONGI
2006
Springer
15 years 7 months ago
Framework for Resource Allocation in Heterogeneous Wireless Networks Using Game Theory
This is a framework for resource allocation in a heterogeneous system composed of various access networks, for instance Third Generation wireless networks (3G) and WLAN, in the pre...
Mariana Dirani, Tijani Chahed