Sciweavers

872 search results - page 33 / 175
» An Access Control Language for a General Provenance Model
Sort
View
IRI
2005
IEEE
14 years 1 months ago
Towards administration of a hybrid role hierarchy
Role-Based Access Control (RBAC) models have emerged as a leading access control approach for today’s information systems. Hybrid role hierarchies introduced in the Generalized ...
Suroop Mohan Chandran, James B. D. Joshi
INFOCOM
1999
IEEE
13 years 12 months ago
User-Friendly Access Control for Public Network Ports
We are facing a growing user demand for ubiquitous Internet access. As a result, network ports and wireless LANs are becoming common in public spaces inside buildings such as loung...
Guido Appenzeller, Mema Roussopoulos, Mary Baker
CCR
2006
154views more  CCR 2006»
13 years 7 months ago
Medium access control issues in sensor networks
Medium access control for wireless sensor networks has been a very active research area for the past couple of years. The sensor networks literature presents an alphabet soup of m...
Muneeb Ali, Umar Saif, Adam Dunkels, Thiemo Voigt,...
MSWIM
2009
ACM
14 years 2 months ago
Medium access control for underwater acoustic sensor networks with MIMO links
The requirements of multimedia underwater monitoring applications with heterogeneous traffic demands in terms of bandwidth and end-to-end reliability are considered in this artic...
Li-Chung Kuo, Tommaso Melodia
20
Voted
ATAL
2005
Springer
14 years 1 months ago
Access control with safe role assignment for mobile agents
Mobile agent systems provide new perspectives for distributed e-commerce applications. Sea-of-Data (SoD) applications are those that need to process huge quantities of distributed...
Guillermo Navarro, Joan Borrell, Jose A. Ortega-Ru...