Sciweavers

316 search results - page 50 / 64
» Conditional Privacy-Aware Role Based Access Control
Sort
View
ETRICS
2006
14 years 1 months ago
A P2P Content Authentication Protocol Based on Byzantine Agreement
One of the main advantages of peer-to-peer (P2P) systems is their capability to offer replicas of the same content at various locations. This allows to access contents even when so...
Esther Palomar, Juan M. Estévez-Tapiador, J...
ACSAC
2003
IEEE
14 years 3 months ago
Modelling Contexts in the Or-BAC Model
As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic requirements. In the Organization Based Access Control (Or...
Frédéric Cuppens, Alexandre Mi&egrav...
NETWORK
2007
121views more  NETWORK 2007»
13 years 9 months ago
Toward Efficient Service-Level QoS Provisioning in Large-Scale 802.11-Based Networks
Along with recent advances in mobile networking and portable computing technologies, there is a trend in the telecommunications industry toward the development of efficient ubiqui...
Tarik Taleb, Abdelhamid Nafaa, Liam Murphy, Kazuo ...
COSIT
2009
Springer
141views GIS» more  COSIT 2009»
14 years 4 months ago
A Conceptual Model of the Cognitive Processing of Environmental Distance Information
Abstract. I review theories and research on the cognitive processing of environmental distance information by humans, particularly that acquired via direct experience in the enviro...
Daniel R. Montello
CSFW
2004
IEEE
14 years 1 months ago
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
Moritz Y. Becker, Peter Sewell