Sciweavers

427 search results - page 11 / 86
» Policies: Giving Users Control over Calls
Sort
View
ISW
2005
Springer
14 years 3 months ago
Evaluating Access Control Policies Through Model Checking
We present a model-checking algorithm which can be used to evaluate access control policies, and a tool which implements it. The evaluation includes not only assessing whether the ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
WIOPT
2005
IEEE
14 years 3 months ago
Distributed Power Allocation and Scheduling for Parallel Channel Wireless Networks
In this paper we develop distributed approaches for power allocation and scheduling in wireless access networks. We consider a model where users communicate over a set of parallel...
Xiangping Qin, Randall Berry
ISW
2009
Springer
14 years 4 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
TIT
2008
110views more  TIT 2008»
13 years 9 months ago
Optimal Cross-Layer Scheduling of Transmissions Over a Fading Multiaccess Channel
We consider the problem of several users transmitting packets to a base station, and study an optimal scheduling formulation involving three communication layers, namely, the mediu...
Munish Goyal, Anurag Kumar, Vinod Sharma
ISICT
2003
13 years 11 months ago
Intelligent access and mobility management in heterogeneous wireless networks using policy
The next generation of mobile networks will utilise multiple radio access technologies. These heterogeneous wireless networks will enable the user to seamlessly roam between the d...
Ken Murray, Rajiv Mathur, Dirk Pesch