169
click to vote
SIS
15 years 6 months ago
2008
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
149
click to vote
SIS
15 years 6 months ago
2008
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
125
Voted
SIS
15 years 6 months ago
2008 119
Voted
SIS
15 years 6 months ago
2008 127
Voted
SIS
15 years 6 months ago
2008 |