Sciweavers

1000 search results - page 97 / 200
» Application Access Control at Network Level
Sort
View
RBAC
1998
84views more  RBAC 1998»
15 years 3 months ago
Decentralized User-role Assignment for Web-based Intranets
The intricacy of security administration is one of the most challenging problems in large networked systems. This problem is especially serious in the Web environment, which consi...
Ravi S. Sandhu, Joon S. Park
DSN
2002
IEEE
15 years 7 months ago
Time-Constrained Failure Diagnosis in Distributed Embedded Systems
—Advanced automotive control applications such as steer-by-wire are typically implemented as distributed systems comprising many embedded processors, sensors, and actuators inter...
Nagarajan Kandasamy, John P. Hayes, Brian T. Murra...
120
Voted
INFOCOM
2010
IEEE
15 years 26 days ago
Incorporating Random Linear Network Coding for Peer-to-Peer Network Diagnosis
—Recent studies show that network coding improves multicast session throughput. In this paper, we demonstrate how random linear network coding can be incorporated to provide netw...
Elias Kehdi, Baochun Li
92
Voted
INFOCOM
1992
IEEE
15 years 6 months ago
An Assessment of State and Lookup Overhead in Routers
The current Internet is based on a stateless (datagram) architecture. However, many recent proposals rely on the maintenance of state information within network routers, leading t...
Deborah Estrin, Danny J. Mitzel
PERCOM
2006
ACM
16 years 2 months ago
Context and Location-Aware Encryption for Pervasive Computing Environments
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...