Sciweavers

481 search results - page 57 / 97
» Analyzing and Managing Role-Based Access Control Policies
Sort
View
ACSAC
2010
IEEE
13 years 7 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
COMCOM
2008
138views more  COMCOM 2008»
13 years 9 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
ICASSP
2011
IEEE
13 years 18 days ago
Adaptive scalable layer filtering process for video scheduling over wireless networks based on MAC buffer management
In this paper, the problem of scalable video delivery over a timevarying wireless channel is considered. Packet scheduling and buffer management in both Application and Medium Acc...
Nesrine Changuel, Nicholas Mastronarde, Mihaela va...
ECTEL
2007
Springer
14 years 3 months ago
Exploiting Policies in an Open Infrastructure for Lifelong Learning
Nowadays, people are in need for continuous learning in order to keep up to date or be upgraded in their job. An infrastructure for lifelong learning requires continuous adaptation...
Juri Luca De Coi, Philipp Kärger, Arne Wolf K...
SAC
2008
ACM
13 years 8 months ago
A cost-driven approach to role engineering
In recent years role-based access control (RBAC) has been spreading within organizations. However, companies still have considerable difficulty migrating to this model, due to the...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...