Sciweavers

596 search results - page 28 / 120
» Theories of Access Consciousness
Sort
View
CCS
2008
ACM
14 years 25 days ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
SEC
2003
14 years 6 days ago
Providing Voice Privacy Over Public Switched Telephone Networks
: The public telephone network has been evolving from manually switched wires carrying analog encoded voice of the 19th century to an automatically switched grid of copper-wired, f...
Mohamed Sharif, Duminda Wijesekera
ICDIM
2007
IEEE
14 years 5 months ago
Route navigation method for disabled access GIS in consideration of abilities and psychologies
: This paper aims to propose a route navigation method for disabled access GIS. We focused the disabled’s psychologies as well as their physical conditions. This paper represents...
Shinobu Izumi, Go Kobayashi, Takaichi Yoshida
ICDCS
2006
IEEE
14 years 4 months ago
On the Access Pricing Issues of Wireless Mesh Networks
This paper studies the use of pricing as an incentive mechanism to encourage private, self-interested nodes to participate in a public wireless mesh network and cooperate in the p...
Ray K. Lam, John C. S. Lui, Dah-Ming Chiu
ICDT
2005
ACM
130views Database» more  ICDT 2005»
14 years 4 months ago
Rewriting Queries Using Views with Access Patterns Under Integrity Constraints
We study the problem of rewriting queries using views in the presence of access patterns, integrity constraints, disjunction, and negation. We provide asymptotically optimal algori...
Alin Deutsch, Bertram Ludäscher, Alan Nash