Sciweavers

316 search results - page 47 / 64
» Conditional Privacy-Aware Role Based Access Control
Sort
View
VTC
2006
IEEE
125views Communications» more  VTC 2006»
14 years 4 months ago
A Carrier Interferometry based Channel Estimation Technique for One-Cell Reuse MIMO-OFDM/TDMA Cellular Systems
Abstract— This paper propose a channel estimation technique for multiple-input multiple-output (MIMO) - orthogonal frequency division multiplexing (OFDM) / time division multiple...
Kazunari Yokomakura, Seiichi Sampei, Hiroshi Harad...
ICTAI
2009
IEEE
14 years 4 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
WETICE
2006
IEEE
14 years 4 months ago
Autonomous Information Unit: Why Making Data Smart Can Also Make Data Secured?
In this paper, we introduce a new fine-grain distributed information protection mechanism which can self-protect, self-discover, self-organize, and selfmanage. In our approach, we...
Edward T. Chow
IJSNET
2007
115views more  IJSNET 2007»
13 years 9 months ago
Implementation and performance evaluation of nanoMAC: a low-power MAC solution for high density wireless sensor networks
: This paper describes the implementation architecture and performance analysis of nanoMAC, a CSMA/CA based medium access control protocol, which is specifically designed for high...
Junaid Ansari, Janne Riihijärvi, Petri Mä...
BPM
2006
Springer
149views Business» more  BPM 2006»
13 years 12 months ago
Verifying BPEL Workflows Under Authorisation Constraints
Abstract. Business Process Execution Language (BPEL), or Web Services BPEL (WS-BPEL), is the standard for specifying workflow process definition using web services. Research on for...
Zhao Xiangpeng, Antonio Cerone, Padmanabhan Krishn...