119
click to vote
SIS
15 years 1 months ago
2008
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
112
click to vote
SIS
15 years 1 months ago
2008
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
SIS
15 years 1 months ago
2008 SIS
15 years 1 months ago
2008 SIS
15 years 1 months ago
2008 |