Sciweavers

1818 search results - page 25 / 364
» How users use access control
Sort
View
ESORICS
2008
Springer
13 years 10 months ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen
JSW
2007
124views more  JSW 2007»
13 years 8 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon
IFIP
2003
Springer
14 years 2 months ago
A Rotational Sector-Based, Receiver-Oriented Mechanism for Location Tracking and Medium Access Control in Ad Hoc Networks Using
The use of directional antenna in wireless ad hoc networks potentially increases simultaneous communication by directing the transmitting and receiving beams towards the receiver a...
Tetsuro Ueda, Shinsuke Tanaka, Dola Saha, Siuli Ro...
CSREAPSC
2006
13 years 10 months ago
An Access Control Framework for Pervasive Computing Environments
Abstract. The explosive evolution of pervasive computing environments presents several new challenges such as smart spaces, invisibility, localized scalability, and masking uneven ...
Sarah Javanmardi, Hadi Hemmati, Rasool Jalili
INFOCOM
2003
IEEE
14 years 2 months ago
Exploiting Multiuser Diversity for Medium Access Control in Wireless Networks
— Multiuser diversity refers to a type of diversity present across different users in a fading environment. This diversity can be exploited by scheduling transmissions so that us...
Xiangping Qin, Randall A. Berry