Sciweavers

660 search results - page 38 / 132
» History-Based Access Control and Secure Information Flow
Sort
View
COMPSEC
2006
97views more  COMPSEC 2006»
13 years 8 months ago
Towards a location-based mandatory access control model
With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be necessary for access control. The use of location inf...
Indrakshi Ray, Mahendra Kumar
DBSEC
2008
188views Database» more  DBSEC 2008»
13 years 10 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
CCS
2009
ACM
14 years 9 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
MOBISYS
2007
ACM
14 years 8 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
SIS
2008
13 years 10 months ago
An Access Control Model for Location based Services
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
Cameron Ross Dunne, Thibault Candebat, David Gray