Sciweavers

640 search results - page 20 / 128
» Access Control for Active Spaces
Sort
View
106
Voted
DATE
2005
IEEE
171views Hardware» more  DATE 2005»
15 years 6 months ago
Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems
As compared to a large spectrum of performance optimizations, relatively little effort has been dedicated to optimize other aspects of embedded applications such as memory space r...
Ozcan Ozturk, Hendra Saputra, Mahmut T. Kandemir, ...
FGCN
2008
IEEE
196views Communications» more  FGCN 2008»
15 years 7 months ago
SS-RBAC: Secure Query Processing Model for Semantic Sensor Networks
This paper proposes a novel secure query processing model for semantic sensor networks. A semantic sensor network (SSN) is a sensor network which includes semantics of sensory dat...
Dongwon Jeong, Hyejin Jeong, Young-Sik Jeong
100
Voted
SAC
2004
ACM
15 years 5 months ago
Web Services for E-commerce: guaranteeing security access and quality of service
Being E-commerce one of the most critical Internet application, it is fundamental to employ technologies which guarantee not only secure transactions but also an adequate quality ...
Mario Bravetti, Roberto Lucchi, Gianluigi Zavattar...
103
Voted
POLICY
2009
Springer
15 years 7 months ago
Towards Session-Aware RBAC Administration and Enforcement with XACML
Abstract—An administrative role-based access control (ARBAC) model specifies administrative policies over a role-based access control (RBAC) system, where an administrative perm...
Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan C...
148
Voted
IWRT
2010
178views Communications» more  IWRT 2010»
14 years 10 months ago
CSMA Multi-stage Anti-collision Protocol for Active RFID Systems
Current anti-collision protocols for active RFID systems stem from the ISO-18000-7 standard, which selects Frame Slotted Aloha as the underlying Medium Access Control protocol. How...
Alejandro Palomo-López, M. Victoria Bueno-D...