Sciweavers

1140 search results - page 128 / 228
» A Purpose-Based Access Control Model
Sort
View
157
Voted
SECON
2010
IEEE
15 years 1 months ago
Deconstructing Interference Relations in WiFi Networks
Abstract--Wireless interference is the major cause of degradation of capacity in 802.11 wireless networks. We present an approach to estimate the interference between nodes and lin...
Anand Kashyap, Utpal Paul, Samir R. Das
147
Voted
ACSW
2003
15 years 5 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
157
Voted

Publication
210views
17 years 1 months ago
Using GIS to Measure the Effect of Overlapping Service Areas on Passenger Boardings at Bus Stops
This study examines the effects of overlapping walking service areas of bus stops on the demand for bus transit. This requires controlling for variation in potential transit demand...
T. J. Kimpel, K. Dueker, A. M. El-Geneidy
128
Voted
IAT
2009
IEEE
15 years 10 months ago
Agent-Based Security System for User Verification
—We present a security system consisting of an arbitrary number of entries, sensors and agents. The intelligent integrated system is based on user modeling, i.e. models of their ...
Erik Dovgan, Bostjan Kaluza, Tea Tusar, Matjaz Gam...
130
Voted
ACSAC
2001
IEEE
15 years 7 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson