Sciweavers

243 search results - page 6 / 49
» Location-Aware Authentication and Access Control
Sort
View
ICPP
2002
IEEE
14 years 18 days ago
Reliable MAC Layer Multicast in IEEE 802.11 Wireless Networks
Multicast/broadcast is an important service primitive in networks. The IEEE 802.11 multicast/broadcast protocol is based on the basic access procedure of Carrier Sense Multiple Ac...
Min-Te Sun, Lifei Huang, Anish Arora, Ten-Hwang La...
SACMAT
2005
ACM
14 years 1 months ago
Adaptive trust negotiation and access control
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
JSW
2007
124views more  JSW 2007»
13 years 7 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon
WETICE
1998
IEEE
13 years 12 months ago
WebGroup: A Secure Group Access Control Tool for the World-Wide Web
We present an integrated secure group access control tool to support workgroups on the World-Wide Web. The system enables user authentication, encrypted communication and fine-gra...
Fabien A. P. Petitcolas, Kan Zhang
ISW
2010
Springer
13 years 5 months ago
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents
We analyze the Extended Access Control (EAC) protocol for authenticated key agreement, recently proposed by the German Federal Office for Information Security (BSI) for the deploym...
Özgür Dagdelen, Marc Fischlin