Sciweavers

125 search results - page 1 / 25
» Efficient techniques for realizing geo-spatial access contro...
Sort
View
CCS
2007
ACM
13 years 8 months ago
Efficient techniques for realizing geo-spatial access control
The problem of key management for access control systems has been well-studied, and the literature contains several schemes for hierarchy-based and temporal-based access control. ...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
FPL
2007
Springer
146views Hardware» more  FPL 2007»
13 years 10 months ago
Efficient External Memory Interface for Multi-processor Platforms Realized on FPGA Chips
The complexity of today’s embedded applications requires modern high-performance embedded System-on-Chip (SoC) platforms to be multiprocessor architectures. Advances in FPGA tec...
Hristo Nikolov, Todor Stefanov, Ed F. Deprettere
TPDS
1998
94views more  TPDS 1998»
13 years 4 months ago
Access Control and Signatures via Quorum Secret Sharing
—We suggest a method of controlling the access to a secure database via quorum systems. A quorum system is a collection of sets (quorums) every two of which have a nonempty inter...
Moni Naor, Avishai Wool
JSAC
2008
111views more  JSAC 2008»
13 years 4 months ago
The end-to-end rate control in multiple-hop wireless networks: Cross-layer formulation and optimal allocation
In this paper, we study the theoretical problem of the end-to-end rate assignment for multi-hop wireless networks. Specifically, we consider the problem of joint congestion control...
Chengnian Long, Bo Li, Qian Zhang, Bin Zhao, Bo Ya...
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
13 years 4 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...