Sciweavers

726 search results - page 90 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
GLOBECOM
2006
IEEE
14 years 1 months ago
Enhanced Per-Flow Admission Control and QoS Provisioning in IEEE 802.11e Wireless LANs
—The emerging IEEE 802.11e standard is expected to provide service differentiation and resource allocation for realtime traffic. To support the transmission of voice and multime...
Yi Liu, Chadi Assi, Anjali Agarwal
ICSE
2010
IEEE-ACM
14 years 15 days ago
Views: object-inspired concurrency control
We present views, a new approach to controlling concurrency. Fine-grained locking is often necessary to increase concurrency. Correctly implementing fine-grained locking with tod...
Brian Demsky, Patrick Lam
MSWIM
2006
ACM
14 years 1 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
IH
1998
Springer
13 years 12 months ago
The Steganographic File System
Abstract. Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported...
Ross J. Anderson, Roger M. Needham, Adi Shamir
CCS
2000
ACM
14 years 2 days ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....