Sciweavers

3712 search results - page 44 / 743
» Role-Based Access Control
Sort
View
GRID
2007
Springer
14 years 1 months ago
Fine-grained access control for GridFTP using SecPAL
– Grid access control policy languages today are generally one of two extremes: either extremely simplistic, or overly complex and challenging for even security experts to use. I...
Marty Humphrey, Sang-Min Park, Jun Feng, Norm Beek...
ATAL
2005
Springer
14 years 1 months ago
Access control with safe role assignment for mobile agents
Mobile agent systems provide new perspectives for distributed e-commerce applications. Sea-of-Data (SoD) applications are those that need to process huge quantities of distributed...
Guillermo Navarro, Joan Borrell, Jose A. Ortega-Ru...
FAST
2009
13 years 5 months ago
Scalable Access Controls for Lineage
Lineage stores often contain sensitive information that needs protection from unauthorized access. We build on prior work for security and privacy of lineage information, focusing...
Arnon Rosenthal, Len Seligman, Adriane Chapman, Ba...
WINET
2002
99views more  WINET 2002»
13 years 7 months ago
Medium Access Control for ATM-to-CDMA Interface
An integrated medium access control framework for a direct sequence code-division multiple access (CDMA) radio access to an asynchronous transfer mode (ATM) network is considered. ...
Aykut Hocanin, Shanuj V. Sarin, Hakan Deliç
ICDCIT
2004
Springer
14 years 1 months ago
Automatic Enforcement of Access Control Policies Among Dynamic Coalitions
The need to securely share information on an ad-hoc basis between collaborating entities is increasingly becoming important. We propose a coalition based access control model (CBAC...
Vijayalakshmi Atluri, Janice Warner