Sciweavers

229 search results - page 12 / 46
» Set Covering Problems in Role-Based Access Control
Sort
View
ICDE
2008
IEEE
129views Database» more  ICDE 2008»
14 years 10 months ago
Optimal Boolean Matrix Decomposition: Application to Role Engineering
Abstract-- A decomposition of a binary matrix into two matrices gives a set of basis vectors and their appropriate combination to form the original matrix. Such decomposition solut...
Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri
ARESEC
2011
110views more  ARESEC 2011»
12 years 9 months ago
ACON: Activity-Centric Access Control for Social Computing
—With increasing amount of sensitive user data stored in social computing systems (SCSs) and lack of consensus on how it should be protected under meaningful control by the avera...
Jaehong Park, Ravi S. Sandhu, Yuan Cheng
ICC
2007
IEEE
136views Communications» more  ICC 2007»
14 years 3 months ago
TCP ACK Congestion Control and Filtering for Fairness Provision in the Uplink of IEEE 802.11 Infrastructure Basic Service Set
—Most of the deployed IEEE 802.11 Wireless Local Area Networks (WLANs) use infrastructure Basic Service Set (BSS) in which an Access Point (AP) serves as a gateway between wired ...
Feyza Keceli, Inanc Inan, Ender Ayanoglu
PVLDB
2008
132views more  PVLDB 2008»
13 years 8 months ago
Access control over uncertain data
Access control is the problem of regulating access to secret information based on certain context information. In traditional applications, context information is known exactly, p...
Vibhor Rastogi, Dan Suciu, Evan Welbourne
IEEECIT
2010
IEEE
13 years 7 months ago
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML
—In this paper we describe extensions to the access control industry standards XACML and SAML to enable privacy-preserving and credential-based access control. Rather than assumi...
Claudio Agostino Ardagna, Sabrina De Capitani di V...