Sciweavers

3712 search results - page 139 / 743
» Role-Based Access Control
Sort
View
CODASPY
2012
12 years 5 months ago
Deriving implementation-level policies for usage control enforcement
Usage control is concerned with how data is used after access to it has been granted. As such, it is particularly relevant to end users who own the data. System implementations of...
Prachi Kumari, Alexander Pretschner
ISCC
2007
IEEE
130views Communications» more  ISCC 2007»
14 years 4 months ago
Pre-Authentication Based Enhancement for Access Control in Hybrid MANETs
We analyze the problem of reducing packet losses due to the authentication time which is required when an ad hoc node switches across different gateways in a mobile ad hoc network...
Rafael Marín López, Pedro M. Ruiz, F...
INTETAIN
2009
Springer
14 years 4 months ago
Accessible Gaming through Mainstreaming Kinetic Controller
Leisure is a very important aspect in our everyday life; and gaming is one of the main ways to it. Depending on the particular situation of each person, the way of playing could be...
Yolanda Garrido, Álvaro Marco, Joaquí...
SIGCSE
2005
ACM
192views Education» more  SIGCSE 2005»
14 years 3 months ago
Ubiquitous presenter: increasing student access and control in a digital lecturing environment
The University of Washington’s Classroom Presenter lecturing system enables an active lecturing environment by combining a standard electronic slide presentation format with the...
Michelle Wilkerson, William G. Griswold, Beth Simo...
INFOCOM
2003
IEEE
14 years 3 months ago
Power Controlled Dual Channel (PCDC) Medium Access Protocol for Wireless Ad Hoc Networks
—In this paper, we propose a comprehensive solution for power control in mobile ad hoc networks (MANETs). Our solution emphasizes the interplay between the MAC and network layers...
Alaa Muqattash, Marwan Krunz