Sciweavers

3712 search results - page 205 / 743
» Role-Based Access Control
Sort
View
ICDCSW
2003
IEEE
15 years 8 months ago
Using Service Brokers for Accessing Backend Servers for Web Applications
— Current Web servers use various API sets to access backend services. This model does not support service differentiation, overload control, caching of contents generated by bac...
Huamin Chen, Prasant Mohapatra
104
Voted
COMAD
2008
15 years 4 months ago
The Efficient Maintenance of Access Roles with Role Hiding
Role-based access control (RBAC) has attracted considerable research interest. However, the computational issues of RBAC models are yet to be thoroughly studied. In this paper, we...
Chaoyi Pang, Xiuzhen Zhang, Yanchun Zhang, Kotagir...
143
Voted
WSC
1997
15 years 4 months ago
Collision Awareness Multiple Access Networks Performance Optimization
Collision awareness (CA) multiple access networks include the carrier sense multiple access (CSMA), ALOHA, and Ethernet networks. In order to maximize throughput with minimum netw...
Paul T. R. Wang, Yoon K. Hong
MMB
2001
Springer
141views Communications» more  MMB 2001»
15 years 7 months ago
Performance Analysis of the Random Access Protocol in TETRAPOL Trunked Radio Networks
This paper provides a performance evaluation of the TETRAPOL random access protocol. The results are based on a Markovian model which is also presented. The Markovian model is use...
Dirk Kuypers, Peter Sievering
107
Voted
HPDC
1999
IEEE
15 years 7 months ago
The UNICORE Architecture Seamless Access to Distributed Resources
Seamless access to different systems of different vendors at different sites is an important prerequisite to effective and efficient use of distributed resources. Learning about n...
Mathilde Romberg