Sciweavers

19 search results - page 1 / 4
» AMBAR Protocol: Access Management Based on Authorization Red...
Sort
View
ICICS
2001
Springer
13 years 9 months ago
AMBAR Protocol: Access Management Based on Authorization Reduction
Óscar Cánovas Reverte, Antonio F. G&...
INFOCOM
2008
IEEE
13 years 11 months ago
A Scalable Method for Access Control in Location-Based Broadcast Services
Abstract. One important problem for such public broadcast LBS is to enforce access control on a large number of subscribers. In such a system a user typically subscribes to a LBS f...
Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Li...
WWW
2003
ACM
14 years 5 months ago
An Application for WebDAV-based Authoring of Databases - WebDAD
We propose a new approach to accessing databases through the Web that is based on the WebDAV protocol (Web-based Distributed Authoring and Versioning). This paper introduces an ex...
Bita Shadgar, Ian Holyer
ACSAC
1999
IEEE
13 years 9 months ago
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
Rolf Oppliger, Andreas Greulich, Peter Trachsel
PERCOM
2010
ACM
13 years 3 months ago
Architecture and protocols for the Internet of Things: A case study
—In this paper, we describe a practical realization of an Internet-of-Things (IoT) architecture at the University of Padova, Italy. Our network spans the floors of different bui...
Angelo Paolo Castellani, Nicola Bui, Paolo Casari,...