Sciweavers

660 search results - page 23 / 132
» History-Based Access Control and Secure Information Flow
Sort
View
IEEEIAS
2009
IEEE
14 years 3 months ago
Secure Access Control Scheme of RFID System Application
-- Radio Frequency Identification (RFID) is a contactless technology, it is considered the way to replace the barcode, since the barcode data is read with line of sight and limits ...
Yu-Chih Huang
ITCC
2005
IEEE
14 years 2 months ago
An Aspect-Oriented Approach to Mobile Agent Access Control
This paper presents an aspect-oriented approach to access control in mobile agent systems, where a multipoint security check mechanism visualizes the services of a host as individ...
Dianxiang Xu, Vivek Goel
ACSAC
1998
IEEE
14 years 27 days ago
Role-Based Access Control Framework for Network Enterprises
A business's success depends on its ability to protect valuable business assets in an increasingly hostile environment. Protecting information requires a cost, not only in pu...
D. J. Thomsen, D. O'Brien, J. Bogle
INAP
2001
Springer
14 years 1 months ago
Content-based Management of Document Access Control
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
JDCTA
2010
172views more  JDCTA 2010»
13 years 3 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh