Sciweavers

3712 search results - page 86 / 743
» Role-Based Access Control
Sort
View
SACMAT
2004
ACM
14 years 1 months ago
On the role of roles: from role-based to role-sensitive access control
This paper maintains that for an access-control mechanism to support a wide range of policies, it is best to dispense with any built-in semantics for roles in the mechanism itself...
Xuhui Ao, Naftaly H. Minsky
IJSN
2006
76views more  IJSN 2006»
13 years 7 months ago
Elliptic curve cryptography-based access control in sensor networks
: Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right ...
Haodong Wang, Bo Sheng, Qun Li
SPC
2005
Springer
14 years 1 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
CCS
2008
ACM
13 years 9 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
EUC
2008
Springer
13 years 9 months ago
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation
The first challenge that we tackle in this paper is how to conduct access control in ubiquitous environments where sites have to handle access requests from their own users as wel...
Omar Hasan, Jean-Marc Pierson, Lionel Brunie