Sciweavers

55 search results - page 8 / 11
» On Key Assignment for Hierarchical Access Control
Sort
View
BPM
2009
Springer
143views Business» more  BPM 2009»
14 years 2 months ago
Integrating Users in Object-Aware Process Management Systems: Issues and Challenges
Despite the increasing maturity of contemporary Workflow Management Systems (WfMS), there still exist numerous process-aware application systems with more or less hard-coded proce...
Vera Künzle, Manfred Reichert
ICC
2007
IEEE
164views Communications» more  ICC 2007»
14 years 2 months ago
An Application-Driven Mobility Management Scheme for Hierarchical Mobile IPv6 Networks
— Mobile users are expected to be highly dynamic in next generation mobile networks. Additionally they will be served a wide variety of services with different transmission rates...
Tarik Taleb, Yuji Ikeda, Kazuo Hashimoto, Yoshiaki...
CCS
2007
ACM
14 years 2 months ago
Provably secure ciphertext policy ABE
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Ling Cheung, Calvin C. Newport
ICISC
2007
105views Cryptology» more  ICISC 2007»
13 years 9 months ago
Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments
Establishing interoperability is the first and foremost problem of secure interoperation in multi-domain environments. In this paper, we propose a framework to facilitate the esta...
Jinwei Hu, Ruixuan Li, Zhengding Lu
TASE
2010
IEEE
13 years 2 months ago
Optimization of Group Elevator Scheduling With Advance Information
Group elevator scheduling has received considerable attention due to its importance to transportation efficiency for mid-rise and high-rise buildings. One important trend to improv...
Jin Sun, Qianchuan Zhao, Peter B. Luh