Sciweavers

55 search results - page 5 / 11
» An attribute-based access matrix model
Sort
View
INFOCOM
2005
IEEE
14 years 2 months ago
Joint congestion control and media access control design for ad hoc wireless networks
Abstract— We present a model for the joint design of congestion control and media access control (MAC) for ad hoc wireless networks. Using contention graph and contention matrix,...
Lijun Chen, Steven H. Low, John C. Doyle
CSFW
2006
IEEE
14 years 2 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
ESORICS
1994
Springer
14 years 19 days ago
On the Expressive Power of the Unary Transformation Model
The Transformation Model TRM was recently introduced 10 in the literature by Sandhu and Ganta. TRM is based on the concept of transformation of rights. The propagation of access ri...
Ravi S. Sandhu, Srinivas Ganta
CORR
2008
Springer
190views Education» more  CORR 2008»
13 years 7 months ago
Chain-Based Representations for Solid and Physical Modeling
In this paper we show that the (co)chain complex associated with a decomposition of the computational domain, commonly called a mesh in computational science and engineering, can b...
Antonio DiCarlo, Franco Milicchio, Alberto Paoluzz...
CORR
2011
Springer
178views Education» more  CORR 2011»
13 years 3 days ago
Asymptotic Analysis of Double-Scattering Channels
—We consider a multiple-input multiple-output (MIMO) multiple access channel (MAC), where the channel between each transmitter and the receiver is modeled by the doubly-scatterin...
Jakob Hoydis, Romain Couillet, Mérouane Deb...