Sciweavers

3712 search results - page 195 / 743
» Role-Based Access Control
Sort
View
ECRTS
2005
IEEE
15 years 8 months ago
A Robust Implicit Access Protocol for Real-Time Wireless Collaboration
Advances in wireless technology have brought us closer to extensive deployment of distributed real-time embedded systems connected through a wireless channel. The medium access co...
Tanya L. Crenshaw, Ajay Tirumala, Spencer Hoke, Ma...
106
Voted
AMW
2010
15 years 4 months ago
Chasing after Secrets in Relational Databases
Abstract. Inference control can guarantee confidentiality but is costly to implement. Access control can be implemented efficiently but cannot guarantee confidentiality. Hence, it ...
Joachim Biskup, Sven Hartmann, Sebastian Link, Jan...
116
Voted
CORR
2008
Springer
84views Education» more  CORR 2008»
15 years 2 months ago
Rate and Power Allocation in Fading Multiple Access Channels
Abstract-- We consider the problem of rate and power allocation in a fading multiple-access channel. Our objective is to obtain rate and power allocation policies that maximize a u...
Ali ParandehGheibi, Atilla Eryilmaz, Asuman E. Ozd...
111
Voted
DRM
2003
Springer
15 years 7 months ago
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (Co...
Susanne Guth, Gustaf Neumann, Mark Strembeck
141
Voted
MMNS
2001
151views Multimedia» more  MMNS 2001»
15 years 4 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin