Sciweavers

1818 search results - page 23 / 364
» How users use access control
Sort
View
IJISEC
2010
121views more  IJISEC 2010»
13 years 7 months ago
Flowchart description of security primitives for controlled physical unclonable functions
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable and that behave like a random function when subjected to a challenge. Their use h...
Boris Skoric, Marc X. Makkes
RR
2010
Springer
13 years 7 months ago
Query-Based Access Control for Ontologies
Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies ...
Martin Knechtel, Heiner Stuckenschmidt
AINA
2004
IEEE
14 years 22 days ago
An Access Control Model Based on Distributed Knowledge Management
The conceptual architecture of the access control system described here is based on automatic distributed acquisition and processing of knowledge about users and devices in comput...
Alexandr Seleznyov, Stephen Hailes
CIMCA
2005
IEEE
14 years 2 months ago
Access Control for Shared Resources
Access control for shared resources is a complex and challenging task, in particular if the access control policy should be able to cope with different kind of sharing and collabo...
Erik Wilde, Nick Nabholz
DCOSS
2007
Springer
14 years 28 days ago
Efficient and Distributed Access Control for Sensor Networks
Sensor networks are often used to sense the physical world and provide observations for various uses. In hostile environments, it is critical to control the network access to ensur...
Donggang Liu