Sciweavers

229 search results - page 6 / 46
» Set Covering Problems in Role-Based Access Control
Sort
View
LREC
2008
133views Education» more  LREC 2008»
13 years 10 months ago
Comparing Set-Covering Strategies for Optimal Corpus Design
This article is interested in the problem of the linguistic content of a speech corpus. Depending on the target task, the phonological and linguistic content of the corpus is cont...
Jonathan Chevelu, Nelly Barbot, Olivier Boëff...
ICISC
2007
105views Cryptology» more  ICISC 2007»
13 years 10 months ago
Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments
Establishing interoperability is the first and foremost problem of secure interoperation in multi-domain environments. In this paper, we propose a framework to facilitate the esta...
Jinwei Hu, Ruixuan Li, Zhengding Lu
FIDJI
2004
Springer
14 years 2 months ago
Task-Based Access Control for Virtual Organizations
Abstract. GOLD (Grid-based Information Models to Support the Rapid Innovation of New High Value-Added Chemicals) is concerned with the dynamic formation and management of virtual o...
Panos Periorellis, Savas Parastatidis
ICC
2008
IEEE
112views Communications» more  ICC 2008»
14 years 3 months ago
Achieving Fair TCP Access in the IEEE 802.11 Infrastructure Basic Service Set
—We illustrate the transport layer unfairness problem in the IEEE 802.11 Wireless Local Area Networks (WLANs). We design a link layer access control block for the Access Point (A...
Feyza Keceli, Inanc Inan, Ender Ayanoglu
PERCOM
2006
ACM
14 years 8 months ago
Criticality Aware Access Control Model for Pervasive Applications
In this paper we present a new framework for specifying access control policies in smart spaces called Criticality-Aware Access Control (CAAC). The main idea is to automatically r...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...