Sciweavers

807 search results - page 63 / 162
» Term Rewriting for Access Control
Sort
View
141
Voted
COMCOM
2006
112views more  COMCOM 2006»
15 years 3 months ago
Performance modelling and evaluation of IEEE 802.11 distributed coordination function in multihop wireless networks
Initially designed for WLAN's, IEEE 802.11 medium access control (MAC) has also been widely used in the research of multihop wireless networks. The core MAC technique of IEEE ...
Jun He, Hung Keng Pung
174
Voted
SACMAT
2009
ACM
15 years 10 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
133
Voted
CCS
2005
ACM
15 years 9 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
SACMAT
2009
ACM
15 years 8 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
121
Voted
BMCBI
2010
110views more  BMCBI 2010»
15 years 3 months ago
OLS Dialog: An open-source front end to the Ontology Lookup Service
Background: With the growing amount of biomedical data available in public databases it has become increasingly important to annotate data in a consistent way in order to allow ea...
Harald Barsnes, Richard G. Côté, Ingv...