Sciweavers

6555 search results - page 118 / 1311
» Secure attribute-based systems
Sort
View
IJIIDS
2010
91views more  IJIIDS 2010»
13 years 6 months ago
On the security of reliable server pooling systems
: In order to cope with the requirements of availability-critical internet services, reliable server pooling (RSerPool) has been developed as the new IETF standard for a lightweigh...
Thomas Dreibholz, Xing Zhou, Martin Becke, Jobin P...
IEEEIAS
2009
IEEE
14 years 3 months ago
Secure Access Control Scheme of RFID System Application
-- Radio Frequency Identification (RFID) is a contactless technology, it is considered the way to replace the barcode, since the barcode data is read with line of sight and limits ...
Yu-Chih Huang
ISORC
2008
IEEE
14 years 3 months ago
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
In this paper, a Role-based Access Control (RBAC) model is applied and extended to a multimedia version called Multi-Role Based Access Control (MRBAC), which can fully support the...
Na Zhao, Min Chen, Shu-Ching Chen, Mei-Ling Shyu
ASIASIM
2004
Springer
14 years 2 months ago
A Security Risk Analysis Model for Information Systems
Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo M...
HPCN
1999
Springer
14 years 1 months ago
A Flexible Security System for Metacomputing Environments
Abstract. A metacomputing environment is a collection of geographically distributed resources (people, computers, devices, databases) connected by one or more high-speed networks, ...
Adam Ferrari, Frederick Knabe, Marty Humphrey, Ste...