Sciweavers

126 search results - page 19 / 26
» Centrality in Policy Network Drawings
Sort
View
MMMACNS
2005
Springer
14 years 29 days ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
CGI
2003
IEEE
13 years 11 months ago
Consistent Visualization and Querying of GIS Databases by a Location-Aware Mobile Agent
Location-aware mobile users need to access, query, and visualize, geographic information in a wide variety of applications including tourism, navigation, environmental management,...
Suresh K. Lodha, Nikolai M. Faaland, Grant Wong, A...
MOBISYS
2003
ACM
14 years 7 months ago
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Advances in sensing and tracking technology enable location-based applications but they also create significant privacy risks. Anonymity can provide a high degree of privacy, save...
Marco Gruteser, Dirk Grunwald
NDSS
2005
IEEE
14 years 1 months ago
Pretty Secure BGP, psBGP
The Border Gateway Protocol (BGP) is an IETF standard inter-domain routing protocol on the Internet. However, it is well known that BGP is vulnerable to a variety of attacks, and ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
NDSS
2002
IEEE
14 years 12 days ago
PAMINA: A Certificate Based Privilege Management System
In this paper we present PAMINA (Privilege Administration and Management INfrAstructure), a privilege management system using authorization certificates. Our system supports distr...
Zoltán Nochta, Peter Ebinger, Sebastian Abe...