Sciweavers

828 search results - page 43 / 166
» Access Control in Location-Based Services
Sort
View
PERCOM
2006
ACM
15 years 9 months ago
Avoiding privacy violations caused by context-sensitive services
The increasing availability of information about people's context makes it possible to deploy context-sensitive services, where access to resources provided or managed by a s...
Urs Hengartner, Peter Steenkiste
WETICE
1996
IEEE
15 years 1 months ago
Role-based security for distributed object systems
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
Nicholas Yialelis, Emil Lupu, Morris Sloman
ICC
2007
IEEE
106views Communications» more  ICC 2007»
15 years 4 months ago
Saturation Throughput Analysis of the 802.11e Enhanced Distributed Channel Access Function
Abstract— The IEEE 802.11e standard has recently been ratified. This standard provides Quality-of-Service (QoS) guarantees in the Medium Access Control (MAC) layer of 802.11 Wir...
Inanc Inan, Feyza Keceli, Ender Ayanoglu
WINET
2002
138views more  WINET 2002»
14 years 9 months ago
An Architecture for Secure Wide-Area Service Discovery
Abstract. The widespread deployment of inexpensive communications technology, computational resources in the networking infrastructure, and network-enabled end devices poses an int...
Todd D. Hodes, Steven E. Czerwinski, Ben Y. Zhao, ...
IADIS
2004
14 years 11 months ago
Access Management in Federated Digital Libraries
With the growth in digital libraries and standardization of protocols for metadata sharing, it is becoming feasible to build federated discovery services which aggregate metadata ...
Kailash Bhoopalam, Kurt Maly, Mohammad Zubair, Rav...