Sciweavers

807 search results - page 66 / 162
» Term Rewriting for Access Control
Sort
View
146
Voted
IPCCC
2005
IEEE
15 years 9 months ago
MMAC: a mobility-adaptive, collision-free MAC protocol for wireless sensor networks
Mobility in wireless sensor networks poses unique challenges to the medium access control (MAC) protocol design. Previous MAC protocols for sensor networks assume static sensor no...
Muneeb Ali, T. Suleman, Zartash Afzal Uzmi
123
Voted
CN
2000
76views more  CN 2000»
15 years 3 months ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...
126
Voted
CCS
2010
ACM
15 years 1 months ago
Adjustable autonomy for cross-domain entitlement decisions
Cross-domain information exchange is a growing problem, as business and governmental organizations increasingly need to integrate their information systems with those of partially...
Jacob Beal, Jonathan Webb, Michael Atighetchi
97
Voted
CCS
2007
ACM
15 years 9 months ago
Trust management services in relational databases
Trust management represents today a promising approach for supporting access control in open environments. While several approaches have been proposed for trust management and sig...
Sabrina De Capitani di Vimercati, Sushil Jajodia, ...
130
Voted
CORR
2008
Springer
143views Education» more  CORR 2008»
15 years 3 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani