Sciweavers

3712 search results - page 202 / 743
» Role-Based Access Control
Sort
View
156
Voted
CORR
2011
Springer
195views Education» more  CORR 2011»
14 years 9 months ago
Context-aware Authorization in Highly Dynamic Environments
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...
116
Voted
EDBT
2008
ACM
137views Database» more  EDBT 2008»
16 years 2 months ago
ACCOn: checking consistency of XML write-access control policies
XML access control policies involving updates may contain security flaws, here called inconsistencies, in which a forbidden operation may be simulated by performing a sequence of ...
Loreto Bravo, James Cheney, Irini Fundulaki
IAJIT
2008
117views more  IAJIT 2008»
15 years 2 months ago
IP Over WDM Network Control: Network Addressing and Restoration
: There are some common network control issues in IP over WDM(IP/ WDM) which includes network addressing, neighborhood discovery, routing behavior, connection setup and tear down, ...
Refat Kibria, Syed Farhan Reza
122
Voted
TCOM
2010
133views more  TCOM 2010»
15 years 1 months ago
Transmission control in cognitive radio as a Markovian dynamic game: Structural result on randomized threshold policies
Abstract——This paper considers an uplink time division multiple access (TDMA) cognitive radio network where multiple cognitive radios (secondary users) attempt to access a spect...
J. Huang, V. Krishnamurthy
120
Voted
EURODAC
1995
IEEE
173views VHDL» more  EURODAC 1995»
15 years 6 months ago
Cooperative concurrency control for design environments
In this paper, we present a new model for concurrency control that supports cooperation of design tools and designers in a design environment. We capture characteristic access and...
Ansgar Bredenfeld