Sciweavers

352 search results - page 21 / 71
» Context-sensitive Access Control Model and Implementation
Sort
View
PODS
2005
ACM
119views Database» more  PODS 2005»
14 years 7 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
ACSAC
2000
IEEE
13 years 12 months ago
A Flexible Access Control Service for Java Mobile Code
Mobile Code (MC) technologies provide appealing solutionsfor the development of Internet applications.For instance, Java technologyfacilitates dynamic loading of application code ...
Antonio Corradi, Rebecca Montanari, Cesare Stefane...
FLAIRS
2001
13 years 9 months ago
An Intelligent Interface for Keyboard and Mouse Control -- Providing Full Access to PC Functionality via Speech
SUITEKeys is a speech user interface for motor-disabled computer users. This interface provides access to all available functionality of a computer by modeling interaction at the ...
Bill Z. Manaris, Renée A. McCauley, Valanne...
JSAC
2011
115views more  JSAC 2011»
13 years 2 months ago
Scalable Cross-Layer Wireless Access Control Using Multi-Carrier Burst Contention
Abstract—The increasing demand for wireless access in vehicular environments (WAVE) supporting a wide range of applications such as traffic safety, surveying, infotainment etc.,...
Bogdan Roman, Ian J. Wassell, Ioannis Chatzigeorgi...
ICDE
2008
IEEE
140views Database» more  ICDE 2008»
14 years 9 months ago
A Security Punctuation Framework for Enforcing Access Control on Streaming Data
The management of privacy and security in the context of data stream management systems (DSMS) remains largely an unaddressed problem to date. Unlike in traditional DBMSs where acc...
Rimma V. Nehme, Elke A. Rundensteiner, Elisa Berti...