Sciweavers

1147 search results - page 94 / 230
» Transformation of Access Rights
Sort
View

Publication
260views
12 years 8 months ago
Alternative Astronomical FITS Imaging
Some important information on images of radio sources, such as radio flux and the noise of the map, is not easily accessible by astronomers other than radio astronomers, unless the...
E.E. Varsaki, N.A.B. Gizani, V. Fotopoulos and A.N...
CCS
2009
ACM
14 years 9 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
GLOBECOM
2008
IEEE
14 years 3 months ago
Jamming ACK Attack to Wireless Networks and a Mitigation Approach
— In many Medium Access Control (MAC) schemes for wireless networks, an Acknowledgment (ACK) packet is transmitted from the data receiver to the data sender to announce the succe...
Zhiguo Zhang, Jingqi Wu, Jing Deng, Meikang Qiu
ISI
2007
Springer
14 years 3 months ago
DOTS: Detection of Off-Topic Search via Result Clustering
— Often document dissemination is limited to a “need to know” basis so as to better maintain organizational trade secrets. Retrieving documents that are off-topic to a user...
Nazli Goharian, Alana Platt
POLICY
2007
Springer
14 years 2 months ago
Policy-Driven Negotiation for Authorization in the Grid
In many Grid services deployments, the clients and servers reside in different administrative domains. Hence, there is a requirement both to discover each other’s authorization ...
Ionut Constandache, Daniel Olmedilla, Frank Sieben...