Sciweavers

798 search results - page 78 / 160
» Comparing the expressive power of access control models
Sort
View
ICIP
2010
IEEE
13 years 6 months ago
GAME-theory-based cross-layer optimization for wireless DS-CDMA visual sensor networks
We propose a game-theory-based cross-layer optimization scheme for wireless Direct Sequence Code Division Multiple Access (DSCDMA) visual sensor networks. The scheme uses the Nash...
Lisimachos P. Kondi, Elizabeth S. Bentley
ODRL
2004
13 years 10 months ago
Interoperability between ODRL and MPEG-21 REL
Two main Rights Expression Languages (RELs) exist to describe licenses governing the access to digital content: ODRL (Open Digital Rights Language) and MPEG-21 REL. Both RELs are ...
Josep Polo, Jose Prados, Jaime Delgado
AINA
2007
IEEE
14 years 1 months ago
Conflict Detection and Resolution in Context-Aware Authorization
Pervasive computing environments introduce new requirements in expressiveness and flexibility of access control policies which are almost addressable leveraging contextual informa...
Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalil...
ICIP
2006
IEEE
14 years 10 months ago
Predictive Modeling of Video Packet Delay in IP Networks
This paper studies linear prediction algorithms for packet-delay modeling. A detailed examination of the delay traces collected from video streams encoded at different bitrates, s...
Ali C. Begen, Mehmet A. Begen, Yucel Altunbasak
CSFW
2005
IEEE
14 years 2 months ago
Nomad: A Security Model with Non Atomic Actions and Deadlines
Modelling security policies requires means to specify permissions and prohibitions. However, this is generally not sufficient to express security properties such as availability ...
Frédéric Cuppens, Nora Cuppens-Boula...