Sciweavers

3899 search results - page 20 / 780
» Argumentation for Access Control
Sort
View
IDEAS
2005
IEEE
113views Database» more  IDEAS 2005»
14 years 3 months ago
Fine-Granularity Access Control in 3-Tier Laboratory Information Systems
Laboratory information systems (LIMS) are used in life science research to manage complex experiments. Since LIMS systems are often shared by different research groups, powerful a...
Xueli Li, Nomair A. Naeem, Bettina Kemme
SACMAT
2003
ACM
14 years 3 months ago
Cryptographic access control in a distributed file system
Traditional access control mechanisms rely on a reference monitor to mediate access to protected resources. Reference monitors are inherently centralized and existing attempts to ...
Anthony Harrington, Christian Damsgaard Jensen
ISORC
2008
IEEE
14 years 4 months ago
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
In this paper, a Role-based Access Control (RBAC) model is applied and extended to a multimedia version called Multi-Role Based Access Control (MRBAC), which can fully support the...
Na Zhao, Min Chen, Shu-Ching Chen, Mei-Ling Shyu
ICC
2008
IEEE
112views Communications» more  ICC 2008»
14 years 4 months ago
Achieving Fair TCP Access in the IEEE 802.11 Infrastructure Basic Service Set
—We illustrate the transport layer unfairness problem in the IEEE 802.11 Wireless Local Area Networks (WLANs). We design a link layer access control block for the Access Point (A...
Feyza Keceli, Inanc Inan, Ender Ayanoglu
HT
2004
ACM
14 years 3 months ago
Twin media: hypertext structure under pressure
This hypertext reports on issues in hypertext rhetoric and presentation that arise in composing a large argumentative hypertext associated with a book version of the same project....
David Kolb