Sciweavers

1818 search results - page 47 / 364
» How users use access control
Sort
View
JSAC
2011
167views more  JSAC 2011»
13 years 4 months ago
Decentralized Cognitive Radio Control Based on Inference from Primary Link Control Information
This work on cognitive radio access ventures beyond the more traditional “listen-before-talk” paradigm that underlies many cognitive radio access proposals. We exploit the bi-...
Senhua Huang, Xin Liu, Zhi Ding
CN
2007
111views more  CN 2007»
13 years 9 months ago
Key management for content access control in a hierarchy
The need for content access control in hierarchies (CACH) appears naturally in all contexts where a set of users have different access rights to a set of resources. The hierarchy...
H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Be...
SGAI
2009
Springer
14 years 3 months ago
Explaining How to Play Real-Time Strategy Games
Real-time strategy games share many aspects with real situations in domains such as battle planning, air traffic control, and emergency response team management which makes them a...
Ronald A. Metoyer, Simone Stumpf, Christoph Neuman...
LISP
2008
97views more  LISP 2008»
13 years 9 months ago
Efficient and flexible access control via Jones-optimal logic program specialisation
We describe the use of a flexible meta-interpreter for performing access control checks on deductive databases. The meta-program is implemented in Prolog and takes as input a datab...
Steve Barker, Michael Leuschel, Mauricio Varea
SACMAT
2009
ACM
14 years 3 months ago
Safety in discretionary access control for logic-based publish-subscribe systems
Publish-subscribe (pub-sub) systems are useful for many applications, including pervasive environments. In the latter context, however, great care must be taken to preserve the pr...
Kazuhiro Minami, Nikita Borisov, Carl A. Gunter