Sciweavers

1627 search results - page 68 / 326
» On context in authorization policy
Sort
View
WCE
2007
13 years 10 months ago
Simulation of IEEE 802.11e in the Context of Interoperability
— This work provides the specification of a MAC layer simulator that evaluates the service quality in WiFi, and presents initial results as a stand-alone simulator. The simulator...
Orlando Cabral, Alberto Segarra, Fernando J. Velez
IFIP
2009
Springer
13 years 7 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
CSREAESA
2010
13 years 7 months ago
Customizable and Predictable Synchronization in a Component-Based OS
Component-based operating systems enable embedded systems to adapt system policies, mechanisms, and abstractions to the specific workloads and contexts of each system. The scope o...
Gabriel Parmer, Jiguo Song
SEMWEB
2007
Springer
14 years 3 months ago
Enabling Advanced and Context-Dependent Access Control in RDF Stores
Semantic Web databases allow efficient storage and access to RDF statements. Applications are able to use expressive query languages in order to retrieve relevant metadata to perfo...
Fabian Abel, Juri Luca De Coi, Nicola Henze, Arne ...
MDM
2004
Springer
14 years 3 months ago
Enabling Context-Aware and Privacy-Conscious User Data Sharing
This paper provides detail on two key components of the Houdini framework under development at Bell Labs, that enable context-aware and privacy-conscious user data sharing appropr...
Richard Hull, Bharat Kumar, Daniel F. Lieuwen, Pet...