Sciweavers

316 search results - page 37 / 64
» Conditional Privacy-Aware Role Based Access Control
Sort
View
SACMAT
2003
ACM
14 years 3 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
ICDE
2008
IEEE
129views Database» more  ICDE 2008»
14 years 11 months ago
Optimal Boolean Matrix Decomposition: Application to Role Engineering
Abstract-- A decomposition of a binary matrix into two matrices gives a set of basis vectors and their appropriate combination to form the original matrix. Such decomposition solut...
Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri
HYBRID
2009
Springer
14 years 4 months ago
Optimal Boundary Control of Convention-Reaction Transport Systems with Binary Control Functions
We investigate a new approach for solving boundary control problems for dynamical systems that are governed by transport equations, when the control function is restricted to binar...
Falk M. Hante, Günter Leugering
MATA
2005
Springer
146views Communications» more  MATA 2005»
14 years 3 months ago
Distributed Authorization Framework for Mobile Agents
Abstract. Mobile agent systems provide new perspectives for distributed e-commerce applications. These applications may present specific restrictions, making mobile agent systems ...
Guillermo Navarro, Jose A. Ortega-Ruiz, Joan Ametl...
ICC
2007
IEEE
288views Communications» more  ICC 2007»
14 years 4 months ago
Joint Channel State Based Random Access and Adaptive Modulation in Wireless LAN with Multi-Packet Reception
—Conventional 802.11 medium access control (MAC) characteristics. In particular, all of these designs adopted a protocols have been designed separately from the characteristics s...
Wei Lan Huang, Khaled Ben Letaief, Ying Jun Zhang