Sciweavers

726 search results - page 52 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
ACMICEC
2008
ACM
195views ECommerce» more  ACMICEC 2008»
13 years 9 months ago
DRM domain authentication using electronic payment systems
This paper focuses on the problem of how to allow sharing of copyrighted content between a set of authorised devices and preventing unauthoried copying of content to other devices...
Imad M. Abbadi, Muntaha Alawneh
CSFW
2012
IEEE
11 years 10 months ago
Secure Compilation to Modern Processors
—We present a secure (fully abstract) compilation scheme to compile an object-based high-level language to lowchine code. Full abstraction is achieved by relying on a fine-grain...
Pieter Agten, Raoul Strackx, Bart Jacobs, Frank Pi...
IJAHUC
2007
99views more  IJAHUC 2007»
13 years 7 months ago
Simulation study of some PRMA-based protocols with channel reservation for data traffic
: Medium Access Control (MAC) and resource allocation are two challenging issues in mobile network. Packet reservation multiple access (PRMA) is considered as a promising MAC proto...
Xue Jun Li, Peter Han Joo Chong
ACSAC
2005
IEEE
14 years 1 months ago
Paranoid: A Global Secure File Access Control System
The Paranoid file system is an encrypted, secure, global file system with user managed access control. The system provides efficient peer-to-peer application transparent file ...
Fareed Zaffar, Gershon Kedem, Ashish Gehani
ICC
2009
IEEE
149views Communications» more  ICC 2009»
13 years 5 months ago
Adoption of Cognitive Radio Scheme to Class-Based Call Admission Control
Abstract--By using cognitive radio technology, opportunistic spectrum access has the potential to solve the underused spectrum problem. In this paper, we employ class-based call ad...
Dongyue Xue, Hui Yu, Xinbing Wang, Hsiao-Hwa Chen