Sciweavers

1818 search results - page 4 / 364
» How users use access control
Sort
View
SWS
2004
ACM
14 years 1 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
ICASSP
2008
IEEE
14 years 2 months ago
Power control in spectrum overlay networks: How to cross a multi-lane highway
—We consider power control in spectrum overlay networks (also referred to as opportunistic spectrum access) where secondary users identify and exploit instantaneous and local spe...
Wei Ren, Qing Zhao, Ashwin Swami
ACSAC
2002
IEEE
14 years 20 days ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...
SASN
2006
ACM
14 years 1 months ago
Inverting sensor networks and actuating the environment for spatio-temporal access control
Wireless sensor networks are typically deployed to measure the information field, rather than create an information field. However, by utilizing the radio on sensor nodes, it is...
Shu Chen, Yu Zhang, Wade Trappe
SPC
2005
Springer
14 years 1 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...