Sciweavers

3712 search results - page 606 / 743
» Role-Based Access Control
Sort
View
BROADNETS
2004
IEEE
14 years 1 months ago
Determining Intra-Flow Contention along Multihop Paths in Wireless Networks
Admission control of flows is essential for providing quality of service in multihop wireless networks. In order to make an admission decision for a new flow, the expected bandwid...
Kimaya Sanzgiri, Ian D. Chakeres, Elizabeth M. Bel...
APNOMS
2006
Springer
14 years 1 months ago
A Novel Rekey Management Scheme in Digital Broadcasting Network
Conditional Access System (CAS) performs entitlement management to make only legitimate subscribers watch pay-services. Generally, CAS uses passive entitlement management to fulfil...
Han-Seung Koo, Il-Kyoo Lee, Jae-Myung Kim, Sung-Wo...
CCS
2004
ACM
14 years 1 months ago
A PIN-entry method resilient against shoulder surfing
Magnetic stripe cards are in common use for electronic payments and cash withdrawal. Reported incidents document that criminals easily pickpocket cards or skim them by swiping the...
Volker Roth, Kai Richter, Rene Freidinger
CSFW
2004
IEEE
14 years 1 months ago
Owned Policies for Information Security
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
Hubie Chen, Stephen Chong
CCS
2006
ACM
14 years 1 months ago
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
Accurate and synchronized time is crucial in many sensor network applications due to the need for consistent distributed sensing and coordination. In hostile environments where an...
Kun Sun, Peng Ning, Cliff Wang