Sciweavers

1611 search results - page 36 / 323
» An Access Control Model for Video Database Systems
Sort
View
IJRR
2011
98views more  IJRR 2011»
14 years 4 months ago
Real-time photorealistic virtualized reality interface for remote mobile robot control
The task of teleoperating a robot over a wireless video link is known to be very difficult. Teleoperation becomes even more difficult when the robot is surrounded by dense obstac...
Alonzo Kelly, Nicholas Chan, Herman Herman, Daniel...
GRID
2006
Springer
14 years 9 months ago
Cacheable Decentralized Groups for Grid Resource Access Control
Abstract-- Sharing data among collaborators in widely distributed systems remains a challenge due to limitations with existing methods for defining groups across administrative dom...
Jeffrey Hemmes, Douglas Thain
DBSEC
2009
163views Database» more  DBSEC 2009»
14 years 10 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
IJNSEC
2010
145views more  IJNSEC 2010»
14 years 4 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
ESORICS
2008
Springer
14 years 11 months ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen