Sciweavers

1818 search results - page 57 / 364
» How users use access control
Sort
View
ECOOP
2009
Springer
14 years 9 months ago
Fine-Grained Access Control with Object-Sensitive Roles
Role-based access control (RBAC) is a common paradigm to ensure that users have sufficient rights to perform various system operations. In many cases though, traditional RBAC does ...
Jeffrey Fischer, Daniel Marino, Rupak Majumdar, To...
WETICE
1998
IEEE
14 years 1 months ago
Authorization and Attribute Certificates for Widely Distributed Access Control
We describe a system whose purpose is to explore the use of certificates for the distributed management of access rights for resources that have multiple, independent, and geograp...
William E. Johnston, Srilekha Mudumbai, Mary R. Th...
ISCA
2010
IEEE
239views Hardware» more  ISCA 2010»
14 years 2 months ago
Sentry: light-weight auxiliary memory access control
Light-weight, flexible access control, which allows software to regulate reads and writes to any granularity of memory region, can help improve the reliability of today’s multi...
Arrvindh Shriraman, Sandhya Dwarkadas
HICSS
2003
IEEE
156views Biometrics» more  HICSS 2003»
14 years 2 months ago
Quality-of-Service-Oriented Media Access Control for Advanced Mobile Multimedia Satellite Systems
Satellite networks offer a number of desirable characteristics including wide area coverage, unique broadcast capabilities, the ability to communicate with hand-held devices, and ...
Petia Todorova, Alexander Markhasin
HICSS
2008
IEEE
211views Biometrics» more  HICSS 2008»
14 years 3 months ago
Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks
—In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol using smart cards for home networks. The proposed scheme is to authenti...
Jongpil Jeong, Min Young Chung, Hyunseung Choo