Sciweavers

2655 search results - page 34 / 531
» Event Systems and Access Control
Sort
View
JSW
2007
124views more  JSW 2007»
13 years 10 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon
MVA
2000
111views Computer Vision» more  MVA 2000»
14 years 6 days ago
A Face Recognition Terminal with Effective Illumination for Access Control Systems
In this paper, a high-performance face recognition terminal for access control systems is described. The terminal is specially designed to acquire stable face patterns for reliabl...
Toshio Sato, Hiroshi Sukegawa, Kentaro Yokoi, Akio...
DEDS
2000
83views more  DEDS 2000»
13 years 10 months ago
Synthesis of Discrete-Event Controllers Based on the Signal Environment
In this paper, we present the integration of controller synthesis techniques in the SIGNAL environment through the description of a tool dedicated to the incremental construction o...
Hervé Marchand, Patricia Bournai, Michel Le...
ISSA
2004
14 years 7 days ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee
IEEEIAS
2009
IEEE
14 years 5 months ago
Secure Access Control Scheme of RFID System Application
-- Radio Frequency Identification (RFID) is a contactless technology, it is considered the way to replace the barcode, since the barcode data is read with line of sight and limits ...
Yu-Chih Huang