Sciweavers

3712 search results - page 569 / 743
» Role-Based Access Control
Sort
View
TCC
2007
Springer
114views Cryptology» more  TCC 2007»
15 years 8 months ago
Multi-authority Attribute Based Encryption
Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
Melissa Chase
ACSAC
2006
IEEE
15 years 8 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
111
Voted
AUIC
2006
IEEE
15 years 8 months ago
Virtual planning rooms (ViPR): a 3D visualisation environment for hierarchical information
The Future Operations Centre Analysis Laboratory (FOCAL) at Australia’s Defence Science and Technology Organisation (DSTO) is aimed at exploring new paradigms for situation awar...
Michael Broughton
129
Voted
CCECE
2006
IEEE
15 years 8 months ago
A Demand-Driven Approach for a Distributed Virtual Environment
The relevance of distributed virtual environments (DVE) and interactive 3D worlds for entertaining and commercial purposes is steadily increasing. DVEs are typically implemented a...
Markus Fakler, Stefan Frenz, Michael Schöttne...
CNSR
2006
IEEE
132views Communications» more  CNSR 2006»
15 years 8 months ago
SCTP Multihoming Support for Handoffs across Heterogeneous Networks
Next-generation mobile terminals are expected to provide users with seamless, uninterrupted network connectivity while moving across wide geographic locations. Achieving continuou...
Farhan Siddiqui, Sherali Zeadally