Sciweavers

831 search results - page 92 / 167
» A Security Concept for OLAP
Sort
View
AINA
2006
IEEE
15 years 3 months ago
Efficient Authentication for Reactive Routing Protocols
Ad hoc networks are dynamic networks formed "on the fly" by a set of nodes. Achieving secure routing in such networks is a big challenge. Asymmetric signature schemes pr...
Raghav Bhaskar, Javier Herranz, Fabien Laguillaumi...
CCGRID
2004
IEEE
15 years 3 months ago
Distributed virtual computers (DVC): simplifying the development of high performance Grid applications
Distributed Virtual Computer (DVC) is a computing environment which simplifies the development and execution of distributed applications on computational grids. DVC provides a sim...
Nut Taesombut, Andrew A. Chien
EUPROJECTS
2006
Springer
15 years 3 months ago
User Interfaces for Persons with Deafblindness
This paper examines problems persons with deafblindness have when using computers and it analyses how we can approach these problems in the redesign of a communication tool. A qual...
Sara Rutgersson, Mattias Arvola
ACSAC
2001
IEEE
15 years 3 months ago
Engineering of Role/Permission Assignments
In this paper, we develop a model for engineering role-permission assignment. Our model builds upon the well-known RBAC96 model [SCFY96]. Assigning permissions to roles is conside...
Pete Epstein, Ravi S. Sandhu
ACSAC
2000
IEEE
15 years 3 months ago
Dynamic Access Control through Petri Net Workflows
Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
Konstantin Knorr