Sciweavers

1818 search results - page 29 / 364
» How users use access control
Sort
View
CIKM
2005
Springer
14 years 2 months ago
Access control for XML: a dynamic query rewriting approach
We introduce the notion of views as a mechanism for securing and providing access control in the context of XML. Research in XML has explored several efficient querying mechanism...
Sriram Mohan, Arijit Sengupta, Yuqing Wu
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
14 years 2 months ago
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach
Controlling access to resources is one of the most important protection goals for web-based services in practice. In general, access control requires identification of subjects t...
Ruben Wolf, Thomas Keinz, Markus Schneider
CSFW
1995
IEEE
14 years 17 days ago
Implementation of a discretionary access control model for script-based systems
Powerful applications can be implemented using command scripts. A command script is a program written by one user, called a writer, and made available to another user, called the ...
Trent Jaeger, Atul Prakash
IFIP
2003
Springer
14 years 2 months ago
A Probabilistic Topology Unaware TDMA Medium Access Control Policy for Ad Hoc Environments
The design of an efficient Medium Access Control (MAC) is challenging in ad-hoc networks where users can enter, leave or move inside the network without any need for prior configu...
Konstantinos Oikonomou, Ioannis Stavrakakis
AMC
2005
116views more  AMC 2005»
13 years 9 months ago
The design of integrating subliminal channel with access control
Recently, Lee and Yang proposed a subliminal scheme which employs an access control in a hierarchy. In their scheme, chief users use a one-way hash function to compute their subord...
Narn-Yih Lee, Shu-Ya Yang