Sciweavers

2655 search results - page 17 / 531
» Event Systems and Access Control
Sort
View
COMSWARE
2006
IEEE
14 years 1 months ago
The SIMPLE presence and event architecture
— Current presence systems offer only basic services that are mostly useful for dial-up environments, while event services have not seen widespread deployment. We describe the SI...
Henning Schulzrinne
JDCTA
2008
74views more  JDCTA 2008»
13 years 7 months ago
Processing Logical Access Control Command in Computer System
Access control includes physical and logical access control. Physical access control protects the damage, theft and losing of assess. In this paper, we propose the method to prote...
Tsang-Yean Lee, Huey-Ming Lee, Wuu-Yee Chen, Heng-...
IDEAS
2005
IEEE
113views Database» more  IDEAS 2005»
14 years 1 months ago
Fine-Granularity Access Control in 3-Tier Laboratory Information Systems
Laboratory information systems (LIMS) are used in life science research to manage complex experiments. Since LIMS systems are often shared by different research groups, powerful a...
Xueli Li, Nomair A. Naeem, Bettina Kemme
SACMAT
2003
ACM
14 years 19 days ago
Cryptographic access control in a distributed file system
Traditional access control mechanisms rely on a reference monitor to mediate access to protected resources. Reference monitors are inherently centralized and existing attempts to ...
Anthony Harrington, Christian Damsgaard Jensen
ISORC
2008
IEEE
14 years 1 months ago
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
In this paper, a Role-based Access Control (RBAC) model is applied and extended to a multimedia version called Multi-Role Based Access Control (MRBAC), which can fully support the...
Na Zhao, Min Chen, Shu-Ching Chen, Mei-Ling Shyu