Sciweavers

742 search results - page 12 / 149
» Constructing Hierarchical Rule Systems
Sort
View
AINA
2004
IEEE
13 years 11 months ago
An Exercise in Constructing Secure Mobile Ad hoc Network (SMANET)
A secure MANET system, called SMANET, was developed that accepts only those packets whose MAC addresses are in the Linux iptable firewall rules. Detailed iptable set up and the pe...
C. Edward Chow, Paul J. Fong, Ganesh Godavari
CTRSA
2010
Springer
211views Cryptology» more  CTRSA 2010»
14 years 1 months ago
Anonymity from Asymmetry: New Constructions for Anonymous HIBE
A Hierarchical Identity Based Encryption (HIBE) system is anonymous if the ciphertext reveals no information about the recipient’s identity. create it. While there are multiple c...
Léo Ducas
SEKE
1994
Springer
14 years 6 hour ago
Rule firing with metarules
We describe a technique for the control of production rules firing in an object-oriented setting. This technique is based on the separation of control rules from ordinary domain r...
François Pachet, Jean-François Perro...
ISORC
2008
IEEE
14 years 2 months ago
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
In this paper, a Role-based Access Control (RBAC) model is applied and extended to a multimedia version called Multi-Role Based Access Control (MRBAC), which can fully support the...
Na Zhao, Min Chen, Shu-Ching Chen, Mei-Ling Shyu
ANLP
1997
108views more  ANLP 1997»
13 years 9 months ago
Construction and Visualization of Key Term Hierarchies
This paper presents a prototype system for key term manipulation and visualization in a real-world commercial environment. The system consists of two components. A preprocessor ge...
Joe Zhou, Troy Tanner