Sciweavers

55 search results - page 4 / 11
» An attribute-based access matrix model
Sort
View
P2P
2010
IEEE
207views Communications» more  P2P 2010»
13 years 8 months ago
Local Access to Sparse and Large Global Information in P2P Networks: A Case for Compressive Sensing
—In this paper we face the following problem: how to provide each peer local access to the full information (not just a summary) that is distributed over all edges of an overlay ...
Rossano Gaeta, Marco Grangetto, Matteo Sereno
ICASSP
2011
IEEE
13 years 1 months ago
Game-theoretic resource allocation in relay-assisted DS/CDMA systems with successive interference cancellation
The problem of non-cooperative resource allocation in an amplifyand-forward relay-assisted DS/CDMA system is addressed. The relay designs its amplify-and-forward matrix for achiev...
Alessio Zappone, Eduard A. Jorswieck
SP
2005
IEEE
104views Security Privacy» more  SP 2005»
14 years 3 months ago
On Safety in Discretionary Access Control
An apparently prevailing myth is that safety is undecidable in Discretionary Access Control (DAC); therefore, one needs to invent new DAC schemes in which safety analysis is decid...
Ninghui Li, Mahesh V. Tripunitara
IHI
2012
217views Healthcare» more  IHI 2012»
12 years 5 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
DBSEC
2009
130views Database» more  DBSEC 2009»
13 years 11 months ago
Implementing Reflective Access Control in SQL
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege in an access control ...
Lars E. Olson, Carl A. Gunter, William R. Cook, Ma...