Sciweavers

270 search results - page 4 / 54
» Idea: Efficient Evaluation of Access Control Constraints
Sort
View
HICSS
2009
IEEE
97views Biometrics» more  HICSS 2009»
14 years 2 months ago
Selecting Web Services and Participants for Enforcing Workflow Access Control
Web services have emerged as a de facto standard for encapsulating services within or across organization boundaries. Various proposals have been made to compose Web services into...
San-Yih Hwang, Chuan Yin, Chien-Hsiang Lee
SACMAT
2010
ACM
13 years 5 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
ICDE
1999
IEEE
91views Database» more  ICDE 1999»
14 years 8 months ago
Real-Time Data Access Control on B-Tree Index Structures
This paper proposes methodologies to control the access of B-tree-indexed data in a batch and real-time fashion. Algorithms are proposed to insert, query, delete, and rebalance B-...
Tei-Wei Kuo, Chih-Hung Wei, Kam-yiu Lam
TWC
2008
124views more  TWC 2008»
13 years 7 months ago
On the Performance of Distributed Polling Service-based Medium Access Control
It has been shown in the literature that many MAC protocols for wireless networks have a considerable control overhead, which limits their achievable throughput and delay performan...
Yihan Li, Shiwen Mao, Shivendra S. Panwar, Scott F...
DBSEC
2006
122views Database» more  DBSEC 2006»
13 years 8 months ago
Term Rewriting for Access Control
We demonstrate how access control models and policies can be represented by using term rewriting systems, and how rewriting may be used for evaluating access requests and for provi...
Steve Barker, Maribel Fernández