Sciweavers

5252 search results - page 918 / 1051
» Logic in Access Control
Sort
View
TMC
2010
190views more  TMC 2010»
15 years 2 months ago
SAMAC: A Cross-Layer Communication Protocol for Sensor Networks with Sectored Antennas
—Wireless sensor networks have been used to gather data and information in many diverse application settings. The capacity of such networks remains a fundamental obstacle toward ...
Emad Felemban, Serdar Vural, Robert Murawski, Eyle...
VSGAMES
2010
114views Game Theory» more  VSGAMES 2010»
15 years 2 months ago
Privacy Challenges and Methods for Virtual Classrooms in Second Life Grid and OpenSimulator
—Mass adoption of virtual world platforms for education and training implies efficient management of computational resources. In Second Life Grid and OpenSimulator, commonly used...
Andreas Vilela, Marcio Cardoso, Daniel Martins, Ar...
COMPSEC
2010
122views more  COMPSEC 2010»
15 years 2 months ago
Taming role mining complexity in RBAC
In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to rol...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
ACSAC
2010
IEEE
15 years 2 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
CSREASAM
2010
15 years 2 months ago
Traffic Management and Security Based on Priority Queueing and Multicore Firewall Implementation
We consider the telematics appliances, such as firewall, as a basic part of security system with specific preemptive priority queuing and access control algorithm oriented on multi...
Vladimir S. Zaborovsky, Vladimir Mulukha, Sergey K...