Sciweavers

3712 search results - page 189 / 743
» Role-Based Access Control
Sort
View
116
Voted
WOWMOM
2005
ACM
112views Multimedia» more  WOWMOM 2005»
15 years 8 months ago
Revisit of RTS/CTS Exchange in High-Speed IEEE 802.11 Networks
IEEE 802.11 Medium Access Control (MAC) called Distributed Coordination Function (DCF) provides two different access modes, namely, 2-way (basic access) and 4-way (RTS/CTS) hands...
Ilenia Tinnirello, Sunghyun Choi, Youngsoo Kim
129
Voted
ICIP
2004
IEEE
16 years 4 months ago
Progressive protection of jpeg2000 codestreams
This paper presents an authentication scheme and an access control scheme for JPEG2000 image codestreams based on hash chains. Both schemes are fully compatible with the core part...
Yongdong Wu, Di Ma, Robert H. Deng
HPDC
2002
IEEE
15 years 7 months ago
A Secure Distributed Search System
This paper presents the design, implementationand evaluation of Mingle, a secure distributed search system. Each participatinghost runs a Mingle server, which maintains an inverte...
Yinglian Xie, David R. O'Hallaron, Michael K. Reit...
102
Voted
CORR
2008
Springer
135views Education» more  CORR 2008»
15 years 2 months ago
Crossing Borders: Security and Privacy Issues of the European e-Passport
The first generation of European e-passports will be issued in 2006. We discuss how borders are crossed regarding the security and privacy erosion of the proposed schemes, and show...
Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs,...
142
Voted
CODASPY
2012
13 years 10 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...