Sciweavers

1927 search results - page 63 / 386
» An Access Control Model for Location based Services
Sort
View
ASIAN
2007
Springer
129views Algorithms» more  ASIAN 2007»
15 years 2 months ago
An Integrated Model for Access Control and Information Flow Requirements
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...
ETFA
2005
IEEE
15 years 3 months ago
Environmental control system based on mobile devices
AbstractThe impact of the use of mobile devices by means of GPRS (General Packet Radio Service) technology to access environmental information in real time, provided by sensors str...
T. Albero, V. Sempere, J. Silvestre, P. Dabbas
TDSC
2008
152views more  TDSC 2008»
14 years 10 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
CLOUDCOM
2010
Springer
14 years 8 months ago
A Token-Based Access Control System for RDF Data in the Clouds
The Semantic Web is gaining immense popularity-and with it, the Resource Description Framework (RDF) broadly used to model Semantic Web content. However, access control on RDF sto...
Arindam Khaled, Mohammad Farhan Husain, Latifur Kh...
CONCURRENCY
2008
104views more  CONCURRENCY 2008»
14 years 10 months ago
PERMIS: a modular authorization infrastructure
Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users....
David W. Chadwick, Gansen Zhao, Sassa Otenko, Roma...