Sciweavers

3712 search results - page 108 / 743
» Role-Based Access Control
Sort
View
ECOOP
1999
Springer
14 years 2 days ago
Providing Fine-grained Access Control for Java Programs
There is considerable interest in programs that can migrate from one host to another and execute. Mobile programs are appealing because they support efficient utilization of networ...
Raju Pandey, Brant Hashii
GLOBECOM
2009
IEEE
13 years 11 months ago
Evolutionary Games for Hybrid Additive White Gaussian Noise Multiple Access Control
Abstract-- In this paper, we propose an evolutionary gametheoretic framework for hybrid additive white Gaussian noise multiple access channels. We consider a communication system c...
Quanyan Zhu, Hamidou Tembine, Tamer Basar
DBSEC
2010
152views Database» more  DBSEC 2010»
13 years 9 months ago
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems
Abstract. We present a modelling language, called X-Policy, for webbased collaborative systems with dynamic access control policies. The access to resources in these systems depend...
Hasan Qunoo, Mark Ryan
IJNSEC
2008
75views more  IJNSEC 2008»
13 years 7 months ago
A Key Management Scheme for Hierarchical Access Control in Group Communication
In group communication, users often have different access rights to multiple data streams. Based on the access relation of users and data streams, users can form partially ordered...
Qiong Zhang, Yuke Wang, Jason P. Jue
SACMAT
2009
ACM
14 years 2 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang