Sciweavers

1587 search results - page 56 / 318
» Access Control for Shared Resources
Sort
View
106
Voted
OTM
2007
Springer
15 years 6 months ago
A Role and Attribute Based Access Control System Using Semantic Web Technologies
We show how Semantic Web technologies can be used to build an access control system. We follow the role-based access control approach (RBAC) and extend it with contextual attribute...
Lorenzo Cirio, Isabel F. Cruz, Roberto Tamassia
103
Voted
ICDCSW
2003
IEEE
15 years 5 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
CCS
2010
ACM
15 years 21 days ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu
EURONGI
2006
Springer
15 years 4 months ago
Framework for Resource Allocation in Heterogeneous Wireless Networks Using Game Theory
This is a framework for resource allocation in a heterogeneous system composed of various access networks, for instance Third Generation wireless networks (3G) and WLAN, in the pre...
Mariana Dirani, Tijani Chahed
EGC
2005
Springer
15 years 6 months ago
Grid Access Middleware for Handheld Devices
Abstract. Grid technology attempts to support flexible, secure, coordinated information sharing among dynamic collections of individuals, institutions, and resources. The use of G...
Saad Liaquat Kiani, Maria Riaz, Sungyoung Lee, Tae...