Sciweavers

1010 search results - page 47 / 202
» An Access Control Framework for Pervasive Computing Environm...
Sort
View
MIDDLEWARE
2009
Springer
15 years 6 months ago
Middleware for Pervasive Spaces: Balancing Privacy and Utility
Abstract. Middleware for pervasive spaces has to meet conflicting requirements. It has to both maximize the utility of the information exposed and ensure that this information doe...
Daniel Massaguer, Bijit Hore, Mamadou H. Diallo, S...
ITCC
2005
IEEE
15 years 5 months ago
Formalisation and implementation of Access control models
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
Mathieu Jaume, Charles Morisset
CONCUR
2006
Springer
15 years 3 months ago
Dynamic Access Control in a Concurrent Object Calculus
Abstract. We develop a variant of Gordon and Hankin's concurrent object calculus with support for flexible access control on methods. We investigate safe administration and ac...
Avik Chaudhuri
SACMAT
2003
ACM
15 years 5 months ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
WINET
2002
169views more  WINET 2002»
14 years 11 months ago
Centaurus: An Infrastructure for Service Management in Ubiquitous Computing Environments
In the near future, we will see dramatic changes in computing and networking hardware. A large number of devices (e.g., phones, PDAs, even small household appliances) will become c...
Lalana Kagal, Vlad Korolev, Sasikanth Avancha, Anu...