Sciweavers

2024 search results - page 64 / 405
» A Logic Based Approach for Dynamic Access Control
Sort
View
PERCOM
2006
ACM
15 years 11 months ago
Exploiting information relationships for access control in pervasive computing
Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a pe...
Urs Hengartner, Peter Steenkiste
IMECS
2007
15 years 1 months ago
Multi-Application Authentication Based on Multi-Agent System
— This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infras...
Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Jun...
ISPEC
2005
Springer
15 years 5 months ago
A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications
Abstract. Access control is a system-wide concern that has both a generic nature and an application dependent characteristic. It is generic as many functions must be protected with...
Kung Chen, Chih-Mao Huang
SWS
2004
ACM
15 years 5 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
WSC
1997
15 years 1 months ago
A Simulation Environment for the Coordinated Operation of Multiple Autonomous Underwater Vehicles
A simulation environment of the coordinated operation of multiple Autonomous Underwater Vehicles (AUVs) is presented. The primary application of this simulation environment is the...
João Borges de Sousa, Aleks Göllü