Sciweavers

5252 search results - page 19 / 1051
» Logic in Access Control
Sort
View
ICC
2009
IEEE
196views Communications» more  ICC 2009»
14 years 5 months ago
Joint Flow Control, Routing and Medium Access Control in Random Access Multi-Hop Wireless Networks
This work extends the existing static framework for joint flow control, routing and medium access control (MAC) in random access multi-hop wireless networks to a dynamic framewor...
Sucha Supittayapornpong, Poompat Saengudomlert
ETRICS
2006
14 years 2 months ago
Controlling Access to Documents: A Formal Access Control Model
Paul E. Sevinç, David A. Basin, Ernst-R&uum...
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
14 years 2 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
VLDB
1998
ACM
134views Database» more  VLDB 1998»
14 years 2 months ago
Design, Implementation, and Performance of the LHAM Log-Structured History Data Access Method
Numerous applications such as stock market or medical information systems require that both historical and current data be logically integrated into a temporal database. The under...
Peter Muth, Patrick E. O'Neil, Achim Pick, Gerhard...
ACSW
2006
13 years 11 months ago
A method for access authorisation through delegation networks
Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for e...
Audun Jøsang, Dieter Gollmann, Richard Au