Sciweavers

1147 search results - page 23 / 230
» Transformation of Access Rights
Sort
View
IJNSEC
2006
112views more  IJNSEC 2006»
13 years 8 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao
ICWS
2004
IEEE
13 years 10 months ago
Access Control for Semantic Web Services
In this paper we make a contribution to the proof and trust layer of the Semantic Web layer cake by integrating two well founded techniques, namely DAML-S (for describing Web serv...
Sudhir Agarwal, Barbara Sprick
CN
2007
112views more  CN 2007»
13 years 8 months ago
Capacity analysis and MAC enhancement for UWB broadband wireless access networks
We analyze the capacity of ultra-wide band (UWB) wireless access networks supporting multimedia services by calculating the number of multimedia connections that can be supported ...
Lin X. Cai, Xuemin Shen, Jon W. Mark, Lin Cai
CIKM
1999
Springer
14 years 27 days ago
Page Access Scheduling in Join Processing
The join relational operation is one of the most expensive among database operations. In this study, we consider the problem of scheduling page accesses in join processing. This r...
Andrew Lim, Jennifer Lai-Pheng Kwan, Wee-Chong Oon
WETICE
1998
IEEE
14 years 26 days ago
WebGroup: A Secure Group Access Control Tool for the World-Wide Web
We present an integrated secure group access control tool to support workgroups on the World-Wide Web. The system enables user authentication, encrypted communication and fine-gra...
Fabien A. P. Petitcolas, Kan Zhang