Sciweavers

316 search results - page 36 / 64
» Conditional Privacy-Aware Role Based Access Control
Sort
View
FGCN
2008
IEEE
196views Communications» more  FGCN 2008»
14 years 4 months ago
SS-RBAC: Secure Query Processing Model for Semantic Sensor Networks
This paper proposes a novel secure query processing model for semantic sensor networks. A semantic sensor network (SSN) is a sensor network which includes semantics of sensory dat...
Dongwon Jeong, Hyejin Jeong, Young-Sik Jeong
CDC
2010
IEEE
106views Control Systems» more  CDC 2010»
13 years 5 months ago
Constructive synchronization of networked feedback systems
This paper is concerned with global asymptotic output synchronization in networks of identical feedback systems. Using an operator theoretic approach based on an incremental small ...
Abdullah Omar Hamadeh, Guy-Bart Stan, Jorge M. Gon...
WETICE
1998
IEEE
14 years 2 months ago
Using SESAME's GSS-API to add Security to Unix Applications
SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an ext...
Paul Ashley, Mark Vandenwauver, Mark Rutherford, S...
FM
1999
Springer
109views Formal Methods» more  FM 1999»
14 years 2 months ago
Compositional Symmetric Sharing in B
Sharing between B constructs is limited, both on the specification and the implementation level. The limitations stem from the single writer/multiple readers paradigm, restricted ...
Martin Büchi, Ralph-Johan Back
ACSAC
2009
IEEE
14 years 4 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...