Sciweavers

270 search results - page 2 / 54
» Idea: Efficient Evaluation of Access Control Constraints
Sort
View
CCS
2008
ACM
13 years 7 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
COMPSAC
2010
IEEE
13 years 3 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
ICWN
2009
13 years 2 months ago
Efficient Medium Access Control with IEEE 802.11 for Mobile Ad Hoc Networks
The IEEE 802.11 Medium Access Control (MAC) protocol has inherent weakness of channel wastage while operating a Mobile Ad hoc Network (MANET). In this paper, we therefore propose s...
Zalal Uddin Mohammad Abusina, Mesbah Uddin, Salahu...
INFOCOM
2012
IEEE
11 years 7 months ago
Maximizing throughput when achieving time fairness in multi-rate wireless LANs
Abstract—This paper focuses on designing a distributed medium access control algorithm that aims at achieving time fairness among contending stations and throughput maximization ...
Yuan Le, Liran Ma, Wei Cheng, Xiuzhen Cheng, Biao ...
LISP
2008
97views more  LISP 2008»
13 years 5 months ago
Efficient and flexible access control via Jones-optimal logic program specialisation
We describe the use of a flexible meta-interpreter for performing access control checks on deductive databases. The meta-program is implemented in Prolog and takes as input a datab...
Steve Barker, Michael Leuschel, Mauricio Varea