Sciweavers

1147 search results - page 31 / 230
» Transformation of Access Rights
Sort
View
CSE
2009
IEEE
14 years 3 months ago
HACK: A Health-Based Access Control Mechanism for Dynamic Enterprise Environments
—Current access control schemes focus on the user and their rights and privileges relating to the access to both initiating functionality and accessing information. This approach...
Chenjia Wang, Kevin P. Monaghan, Weisong Shi
ADHOC
2007
137views more  ADHOC 2007»
13 years 8 months ago
"MeshUp": Self-organizing mesh-based topologies for next generation radio access networks
The phenomenal growth in wireless technologies has brought about a slew of new services. Incumbent with the new technology is the challenge of providing flexible, reconfigurable...
Samik Ghosh, Kalyan Basu, Sajal K. Das
CBMS
2008
IEEE
14 years 3 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
ESORICS
2008
Springer
13 years 10 months ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen
ADC
2008
Springer
114views Database» more  ADC 2008»
13 years 10 months ago
An Integrated Access Control for Securely Querying and Updating XML Data
Many existing access controls use node filtering or querying rewriting techniques. These techniques require rather time-consuming processes such as parsing, labeling, pruning and/...
Maggie Duong, Yanchun Zhang