Sciweavers

1517 search results - page 45 / 304
» Time and Location Based Services with Access Control
Sort
View
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
14 years 3 months ago
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
Abstract. Being able to access and provide Internet services anonymously is an important mechanism to ensure freedom of speech in vast parts of the world. Offering location-hidden...
Jörg Lenhard, Karsten Loesing, Guido Wirtz
SACMAT
2005
ACM
14 years 2 months ago
Relevancy based access control of versioned XML documents
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us w...
Mizuho Iwaihara, Somchai Chatvichienchai, Chutipor...
ADC
2009
Springer
175views Database» more  ADC 2009»
14 years 3 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
NCA
2007
IEEE
14 years 3 months ago
FRAC: Implementing Role-Based Access Control for Network File Systems
We present FRAC, a Framework for Role-based Access Control in network file systems. FRAC is a reference monitor that controls the message flow between file system clients and s...
Aniruddha Bohra, Stephen Smaldone, Liviu Iftode
CN
2007
137views more  CN 2007»
13 years 8 months ago
A survey on ultra wide band medium access control schemes
Ultra wideband (UWB) technology based primarily on the impulse radio paradigm has a huge potential for revolutionizing the world of digital communications especially wireless comm...
Ashima Gupta, Prasant Mohapatra