Sciweavers

315 search results - page 42 / 63
» Supporting location-based conditions in access control polic...
Sort
View
CSFW
2005
IEEE
14 years 2 months ago
Nomad: A Security Model with Non Atomic Actions and Deadlines
Modelling security policies requires means to specify permissions and prohibitions. However, this is generally not sufficient to express security properties such as availability ...
Frédéric Cuppens, Nora Cuppens-Boula...
ACSAC
2001
IEEE
14 years 4 days ago
A Regulated Approach to Certificate Management
Traditionally, creation and revocation of certificates are performed manually, by trusted agents, under conditions that are rarely formalized. This approach to certificate managem...
Victoria Ungureanu
IJET
2008
95views more  IJET 2008»
13 years 7 months ago
Supporting life-long competence development using the TENCompetence infrastructure: a first experiment
This paper describes an experiment to explore the effects of the TENCompetence infrastructure for supporting lifelong competence development which is now in development. This infra...
Judith Schoonenboom, Henk Sligte, Ayman Moghnieh, ...
LANC
2009
ACM
178views Education» more  LANC 2009»
14 years 1 months ago
A connection level model for IEEE 802.11 cells
We study a wireless network under the 802.11 random access protocol, supporting multiple physical layer rates. Based on models for the effective packet rates achieved at the MAC ...
Andrés Ferragut, Fernando Paganini
USENIX
2003
13 years 9 months ago
Secure and Flexible Global File Sharing
Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...