Sciweavers

3712 search results - page 731 / 743
» Role-Based Access Control
Sort
View
JASIS
2007
128views more  JASIS 2007»
13 years 7 months ago
The changing nature of information work in museums
This paper presents results from twenty-one semi-structured interviews with museum information professionals (MIPs) who were asked about their experiences working with information...
Paul F. Marty
JCM
2007
101views more  JCM 2007»
13 years 7 months ago
Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond
Abstract— New applications for Radio Frequency Identification (RFID) technology include embedding transponders in everyday things used by individuals, such as library books, pay...
Marci Meingast, Jennifer King, Deirdre K. Mulligan
JIPS
2007
223views more  JIPS 2007»
13 years 7 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
TSP
2008
109views more  TSP 2008»
13 years 7 months ago
Constrained Tensor Modeling Approach to Blind Multiple-Antenna CDMA Schemes
In this paper, we consider an uplink multiple-antenna Code-Division Multiple-Access (CDMA) system linking several multiple-antenna mobile users to one multiple-antenna base-statio...
André L. F. de Almeida, Gérard Favie...
TWC
2008
120views more  TWC 2008»
13 years 7 months ago
A cartel maintenance framework to enforce cooperation in wireless networks with selfish users
Abstract-- In distributed wireless networks without centralized control, each user is its own authority to maximize its own performance. This distributed characteristic provides th...
Zhu Han, Zhu Ji, K. J. Ray Liu