Sciweavers

1000 search results - page 27 / 200
» Application Access Control at Network Level
Sort
View
CCS
2009
ACM
14 years 2 months ago
Proximity-based access control for implantable medical devices
We propose a proximity-based access control scheme for implantable medical devices (IMDs). Our scheme is based on ultrasonic distancebounding and enables an implanted medical devi...
Kasper Bonne Rasmussen, Claude Castelluccia, Thoma...
ACSAC
2000
IEEE
13 years 12 months ago
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture
In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
P. C. Clark, M. C. Meissner, K. O. Vance
NETWORK
2007
159views more  NETWORK 2007»
13 years 7 months ago
A Generic Framework for Modeling MAC Protocols in Wireless Broadband Access Networks
In this article, we present a simple yet accurate generic analytical model for a family of slotted carrier sense multiple access with collision avoidance (CSMA/CA) based medium ac...
Xinhua Ling, Jon W. Mark, Xuemin Shen, Yu Cheng
ACSW
2006
13 years 9 months ago
A method for access authorisation through delegation networks
Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for e...
Audun Jøsang, Dieter Gollmann, Richard Au
WETICE
1996
IEEE
13 years 11 months ago
Role-based security for distributed object systems
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
Nicholas Yialelis, Emil Lupu, Morris Sloman