Sciweavers

3712 search results - page 201 / 743
» Role-Based Access Control
Sort
View
123
Voted
CCS
2000
ACM
15 years 7 months ago
XML document security based on provisional authorization
The extensible markup language (XML) is a promising standard for describing semi-structured information and contents on the Internet. When XML comes to be a widespread data encodi...
Michiharu Kudo, Satoshi Hada
108
Voted
COMPSAC
2001
IEEE
15 years 6 months ago
Certificate Based Authorization Simulation System
Using certificates for distributed authorizations in computer network systems has been discussed in the literature. However real implementations of the concept are rarely seen. In...
Jie Dai, Jim Alves-Foss
136
Voted
ADHOCNOW
2008
Springer
15 years 3 months ago
A Prediction Based Cross-Layer MAC/PHY Interface for CDMA Ad Hoc Networks
Variable environments in ad hoc networks require a joint control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. In this paper,...
Pegdwindé Justin Kouraogo, François ...
108
Voted
DPD
2007
100views more  DPD 2007»
15 years 2 months ago
Sharing hierarchical context for mobile web services
Context has the potential to enhance Web services in mobile environments to a great extent. Yet, challenges such as bandwidth restriction or dynamic changes require considerations ...
Christoph Dorn, Schahram Dustdar
109
Voted
ICAI
2009
15 years 12 days ago
Autonomic Self-Healing for MANETs
Junaid Ahsenali Chaudhry, Yonghwan Lee, Ken R. Pen...