Sciweavers

1818 search results - page 118 / 364
» How users use access control
Sort
View
TMC
2008
210views more  TMC 2008»
13 years 8 months ago
Adaptive Cluster-Based Data Collection in Sensor Networks with Direct Sink Access
Recently wireless sensor networks featuring direct sink access have been studied as an efficient architecture to gather and process data for numerous applications. In this paper, w...
Mahdi Lotfinezhad, Ben Liang, Elvino S. Sousa
HPDC
2002
IEEE
14 years 2 months ago
Dynamic Right-Sizing in FTP (drsFTP): Enhancing Grid Performance in User-Space
With the advent of computational grids, networking performance over the wide-area network (WAN) has become a critical component in the grid infrastructure. Unfortunately, many hig...
Mark K. Gardner, Wu-chun Feng, Mike Fisk
ACSAC
1998
IEEE
14 years 1 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
WSC
1997
13 years 10 months ago
A Java Based System for Specifying Hierarchical Control Flow Graph Models
The portion of the Hierarchical Modeling And Simulation System-Java (HiMASS-j) used for specifying Hierarchical Control Flow Graph (HCFG) Models is described. The specification o...
Thorsten Daum, Robert G. Sargent
SACMAT
2003
ACM
14 years 2 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck