Sciweavers

3712 search results - page 198 / 743
» Role-Based Access Control
Sort
View
137
Voted
SRDS
2006
IEEE
15 years 8 months ago
Cryptree: A Folder Tree Structure for Cryptographic File Systems
We present Cryptree, a cryptographic tree structure which facilitates access control in file systems operating on untrusted storage. Cryptree leverages the file system’s folde...
Dominik Grolimund, Luzius Meisser, Stefan Schmid, ...
107
Voted
DBSEC
2000
112views Database» more  DBSEC 2000»
15 years 4 months ago
Coordinating Policy for Federated Applications
Abstract At the start of its present term of office in 1997 the UK government published a planning document promising ubiquitous access to Electronic Health Records (EHRs) held wit...
Ken Moody
116
Voted
CORR
2006
Springer
126views Education» more  CORR 2006»
15 years 2 months ago
Power Control for User Cooperation
For a fading Gaussian multiple access channel with user cooperation, we obtain the optimal power allocation policies that maximize the rates achievable by block Markov superpositi...
Onur Kaya, Sennur Ulukus
119
Voted
LCN
2007
IEEE
15 years 9 months ago
Performance Analysis of Single Cell IEEE 802.16e Wireless MAN
—The IEEE 802.16 standard (commonly known as WiMAX), which has emerged as a broadband wireless access technology, is capable of delivering very high data rates. The grant/request...
Thierry Peyre, Rachid El Azouzi
DASFAA
2007
IEEE
188views Database» more  DASFAA 2007»
15 years 9 months ago
Security-Conscious XML Indexing
To support secure exchanging and sharing of XML data over the Internet, a myriad of XML access control mechanisms have been proposed. In the setting of node-level fine-grained acc...
Yan Xiao, Bo Luo, Dongwon Lee