Sciweavers

798 search results - page 61 / 160
» Comparing the expressive power of access control models
Sort
View
SACMAT
2009
ACM
14 years 3 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
WWW
2001
ACM
14 years 9 months ago
A unified constraint model for XML
Integrity constraints are an essential part of a modern schema definition language. They are useful for semantic specification, update consistency control, query optimization, inf...
Gabriel M. Kuper, Jérôme Siméo...
SEUS
2007
IEEE
14 years 3 months ago
Event-Driven Power Management for Wireless Sensor Networks
In this paper we propose event-driven power management techniques for wireless sensor networks. To accomplish this we model a sensor network application as a set of application-spe...
Sang Hoon Lee, Byong-Ha Cho, Lynn Choi, Sun-Joong ...
ISCC
2007
IEEE
109views Communications» more  ISCC 2007»
14 years 3 months ago
MBMS Power Planning in Macro and Micro Cell Environments
Multimedia Broadcast Multicast Services (MBMS), introduced in Third Generation Partnership Project (3GPP) Release 6, is a point-to-multipoint downlink bearer service that addresse...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
ER
2007
Springer
100views Database» more  ER 2007»
14 years 3 months ago
On Languages for the Specification of Integrity Constraints in Spatial Conceptual Models
This paper intends to classify, review, and compare the existing languages for the specification of spatial integrity constraints at the conceptual level. We classify these languag...
Mehrdad Salehi, Yvan Bédard, Mir Abolfazl M...