Sciweavers

1587 search results - page 143 / 318
» Access Control for Shared Resources
Sort
View
92
Voted
CDC
2010
IEEE
113views Control Systems» more  CDC 2010»
14 years 7 months ago
Independent vs. joint estimation in multi-agent iterative learning control
This paper studies iterative learning control (ILC) in a multi-agent framework. A group of agents simultaneously and repeatedly perform the same task. The agents improve their perf...
Angela Schöllig, Javier Alonso-Mora, Raffaell...
EUROMICRO
2004
IEEE
15 years 4 months ago
Handover in Mobile Communication Networks: Who is in Control Anyway?
The migration from 3rd generation mobile communication networks to 4th generation, purely IP-based networks leads to new chances, but also great risks for the traditional mobile n...
Frank A. Zdarsky, Jens B. Schmitt
ACSW
2003
15 years 2 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
95
Voted
CSFW
2008
IEEE
15 years 7 months ago
Evidence-Based Audit
Authorization logics provide a principled and flexible approach to specifying access control policies. One of their compelling benefits is that a proof in the logic is evidence ...
Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, Steve...
81
Voted
DISCEX
2003
IEEE
15 years 6 months ago
Integrated Security Services for Dynamic Coalitions
Coalitions are collaborative networks of autonomous domains where resource sharing is achieved by the distribution of access permissions to coalition members based on negotiated r...
Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bo...