Sciweavers

3712 search results - page 190 / 743
» Role-Based Access Control
Sort
View
PST
2004
15 years 3 months ago
Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities
This paper presents the first mediated hierarchical identity-based encryption and signature schemes. Both schemes are designed to support information access control in hierarchical...
Deholo Nali, Ali Miri, Carlisle M. Adams
SAC
2004
ACM
15 years 8 months ago
Web Services for E-commerce: guaranteeing security access and quality of service
Being E-commerce one of the most critical Internet application, it is fundamental to employ technologies which guarantee not only secure transactions but also an adequate quality ...
Mario Bravetti, Roberto Lucchi, Gianluigi Zavattar...
ACNS
2010
Springer
150views Cryptology» more  ACNS 2010»
15 years 7 months ago
Regulatory Compliant Oblivious RAM
Abstract. We introduce WORM-ORAM, a first mechanism that combines Oblivious RAM (ORAM) access privacy and data confidentiality with Write Once Read Many (WORM) regulatory data re...
Bogdan Carbunar, Radu Sion
270
Voted
SACMAT
2011
ACM
14 years 5 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we de...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
154
Voted
VTC
2010
IEEE
162views Communications» more  VTC 2010»
15 years 28 days ago
Cognitive Radio Enabled Multi-Channel Access for Vehicular Communications
—The IEEE 1609.4 standard has been proposed to provide multi-channel operations in wireless access for vehicular environments (WAVE), where all the channels are periodically sync...
Jui-Hung Chu, Kai-Ten Feng, Chen-Nee Chuah, Chin-F...