Sciweavers

32 search results - page 6 / 7
» A location aware role and attribute based access control sys...
Sort
View
SACMAT
2005
ACM
13 years 10 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
PCM
2004
Springer
121views Multimedia» more  PCM 2004»
13 years 10 months ago
A Java-Based Collaborative Authoring System for Multimedia Presentation
Abstract. In this paper, we propose a Java-based collaborative authoring system for multimedia presentation. Our system is composed of an Editing System, a Media Object Manager and...
Mee Young Sung, Do Hyung Lee
CCS
2008
ACM
13 years 7 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
ICDIM
2007
IEEE
13 years 11 months ago
Context-aware security service in RFID/USN environments using MAUT and extended GRBAC
: This paper proposes a context-aware security service providing multiple authentications and authorization from a Security Level which is decided dynamically in a context-aware en...
Kiyeal Lee, Seokhwan Yang, Sungik Jun, Mokdong Chu...
IEEEARES
2008
IEEE
13 years 11 months ago
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks
— Access control concerns in MANETs are very serious and considered as a crucial challenge for operators who prospects to employ unrivaled capabilities of such networks for diffe...
Amir R. Khakpour, Maryline Laurent-Maknavicius, Ha...