Sciweavers

2172 search results - page 120 / 435
» Distributed User Access Control in Sensor Networks
Sort
View
SP
2007
IEEE
183views Security Privacy» more  SP 2007»
14 years 2 months ago
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
John Bethencourt, Amit Sahai, Brent Waters
CCS
2004
ACM
14 years 1 months ago
KNOW Why your access was denied: regulating feedback for usable security
We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
ETFA
2005
IEEE
14 years 1 months ago
Environmental control system based on mobile devices
AbstractThe impact of the use of mobile devices by means of GPRS (General Packet Radio Service) technology to access environmental information in real time, provided by sensors str...
T. Albero, V. Sempere, J. Silvestre, P. Dabbas
ICC
2009
IEEE
129views Communications» more  ICC 2009»
14 years 2 months ago
Random Access Protocols for WLANs Based on Mechanism Design
— In wireless local area networks (WLANs), quality of service (QoS) can be provided by mapping applications with different requirements (e.g., delay and throughput) into one of t...
Man Hon Cheung, Amir Hamed Mohsenian Rad, Vincent ...
MOBICOM
2004
ACM
14 years 1 months ago
Broadcast reception rates and effects of priority access in 802.11-based vehicular ad-hoc networks
One key usage of VANET is to support vehicle safety applications. This use case is characterized by the prominence of broadcasts in scaled settings. In this context, we try to ans...
Marc Torrent-Moreno, Daniel Jiang, Hannes Hartenst...