Sciweavers

311 search results - page 23 / 63
» Administration in role-based access control
Sort
View
INFOCOM
2010
IEEE
14 years 8 months ago
A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks
—This paper introduces a self-organized mechanism to control user access in ad hoc networks without requiring any infrastructure or a central administration entity. The proposed ...
Natalia Castro Fernandes, Marcelo D. D. Moreira, O...
DBSEC
2006
122views Database» more  DBSEC 2006»
14 years 11 months ago
Term Rewriting for Access Control
We demonstrate how access control models and policies can be represented by using term rewriting systems, and how rewriting may be used for evaluating access requests and for provi...
Steve Barker, Maribel Fernández
84
Voted
CONCUR
2006
Springer
15 years 1 months ago
Dynamic Access Control in a Concurrent Object Calculus
Abstract. We develop a variant of Gordon and Hankin's concurrent object calculus with support for flexible access control on methods. We investigate safe administration and ac...
Avik Chaudhuri
SACMAT
2004
ACM
15 years 3 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
CIMCA
2005
IEEE
15 years 3 months ago
Access Control for Shared Resources
Access control for shared resources is a complex and challenging task, in particular if the access control policy should be able to cope with different kind of sharing and collabo...
Erik Wilde, Nick Nabholz