Sciweavers

230 search results - page 19 / 46
» Exploring reactive access control
Sort
View
CHI
2003
ACM
14 years 11 months ago
The neurally controllable internet browser (BrainBrowser)
The Internet has become an important part of our daily lives, with browsers serving as the main tool of navigation. For users with severe disabilities, access to the Internet can ...
Opé Tomori, Melody M. Moore
ICNP
2003
IEEE
14 years 4 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
COLCOM
2008
IEEE
14 years 5 months ago
A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments
Abstract. We investigate a security framework for collaborative applications that relies on the role-based access control (RBAC) model. In our framework, roles are pre-defined and...
Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko...
IDEAS
2005
IEEE
124views Database» more  IDEAS 2005»
14 years 4 months ago
Flexible Update Management in Peer-to-Peer Database Systems
Promising the combination of dynamic configuration, scalability and redundancy, peer-to-peer (P2P) networks have garnered tremendous interest lately. Before long, this interest ex...
David Del Vecchio, Sang Hyuk Son
ICAS
2005
IEEE
111views Robotics» more  ICAS 2005»
14 years 4 months ago
COOP - A cooperative caching service in MANETs
Data access applications in Mobile Ad Hoc Networks (MANETs) suffer from intermittent network connections and restricted power supplies. While most of the researches focus on Media...
Yu Du, Sandeep K. S. Gupta