Sciweavers

1082 search results - page 40 / 217
» Policy support for call control
Sort
View
INFOCOM
2008
IEEE
14 years 3 months ago
A New ACK Policy To Mitigate the Effects of Coexisting IEEE 802.11/802.11e Devices
— In IEEE 802.11 wireless networks, EDCA users’ performance may be degraded because of the existence of legacy users and therefore would get a lower priority service. Such effe...
Haithem Al-Mefleh, J. Morris Chang
SACMAT
2009
ACM
14 years 3 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
RTAS
2002
IEEE
14 years 1 months ago
RAP: A Real-Time Communication Architecture for Large-Scale Wireless Sensor Networks
Large-scale wireless sensor networks represent a new generation of real-time embedded systems with significantly different communication constraints from traditional networked sys...
Chenyang Lu, Brian M. Blum, Tarek F. Abdelzaher, J...
ICISS
2005
Springer
14 years 2 months ago
Protection of Relationships in XML Documents with the XML-BB Model
Since XML tends to become the main format to exchange data over the Internet, it is necessary to define a security model to control the access to the content of these documents. S...
Frédéric Cuppens, Nora Cuppens-Boula...
ESORICS
2007
Springer
14 years 2 months ago
Conditional Privacy-Aware Role Based Access Control
Privacy is considered critical for all organizations needing to manage individual related information. As such, there is an increasing need for access control models which can adeq...
Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo