Sciweavers

64 search results - page 5 / 13
» Criticality Aware Access Control Model for Pervasive Applica...
Sort
View
IJNSEC
2006
156views more  IJNSEC 2006»
13 years 8 months ago
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Munirul M. Haque, Sheikh Iqbal Ahamed
INFORMATICALT
2008
115views more  INFORMATICALT 2008»
13 years 8 months ago
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Mustafa M. Kocatürk, Taflan I. Gündem
COMPSEC
2006
97views more  COMPSEC 2006»
13 years 8 months ago
Towards a location-based mandatory access control model
With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be necessary for access control. The use of location inf...
Indrakshi Ray, Mahendra Kumar
AINA
2007
IEEE
14 years 23 days ago
Conflict Detection and Resolution in Context-Aware Authorization
Pervasive computing environments introduce new requirements in expressiveness and flexibility of access control policies which are almost addressable leveraging contextual informa...
Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalil...
IISWC
2006
IEEE
14 years 2 months ago
Application-Aware Power Management
Abstract— This paper presents our approach for applicationaware power management. We combine continuous monitoring of critical workload indicators, online power and performance m...
Karthick Rajamani, Heather Hanson, Juan Rubio, Sor...