Sciweavers

726 search results - page 34 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
JTAER
2010
147views more  JTAER 2010»
13 years 6 months ago
Privacy Issues for Online Personal Photograph Collections
Technological developments now allow community groups, clubs, and even ordinary individuals to create their own, publicly accessible online digital multi-media collections. Howeve...
Sally Jo Cunningham, Masood Masoodian, Anne Adams
SACMAT
2009
ACM
14 years 2 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
VTC
2006
IEEE
14 years 1 months ago
Two-Level Fractional Guard Channels for Priority Access in Cellular Systems
– A two-level fractional guard channels (TLFGC) scheme to efficiently provide priority access for handoff calls over new calls in cellular systems is proposed. The switching betw...
David Tung Chong Wong, Jon W. Mark, Kee Chaing Chu...
CCS
2008
ACM
13 years 9 months ago
A formal framework for reflective database access control policies
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an acce...
Lars E. Olson, Carl A. Gunter, P. Madhusudan
INFOCOM
2009
IEEE
14 years 2 months ago
Optimal Sensing-Transmission Structure for Dynamic Spectrum Access
—In cognitive wireless networks where secondary users (SUs) opportunistically access spectral white spaces of primary users (PUs), there exists an inherent tradeoff between sensi...
Senhua Huang, Xin Liu, Zhi Ding