Sciweavers

1611 search results - page 38 / 323
» An Access Control Model for Video Database Systems
Sort
View
120
Voted
CODASPY
2011
14 years 1 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
SWS
2004
ACM
15 years 3 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
HICSS
2000
IEEE
146views Biometrics» more  HICSS 2000»
15 years 2 months ago
Transmission of MPEG-2 Encoded VoD Services over Wireless Access Networks Using Type-II Hybrid ARQ Schemes with RCPC Codes
In this paper, we investigate the e ectiveness of applying type-II hybrid ARQ schemes to the transmission of MPEG-2 encoded video streams over xed wireless links in broadband xed ...
Hairuo Ma, Magda El Zarki
INFOCOM
2005
IEEE
15 years 3 months ago
Joint congestion control and media access control design for ad hoc wireless networks
Abstract— We present a model for the joint design of congestion control and media access control (MAC) for ad hoc wireless networks. Using contention graph and contention matrix,...
Lijun Chen, Steven H. Low, John C. Doyle
86
Voted
RTS
2006
115views more  RTS 2006»
14 years 9 months ago
Resource access control for dynamic priority distributed real-time systems
Many of today's complex computer applications are being modeled and constructed using the principles inherent to real-time distributed object systems. In response to this dem...
Chen Zhang, David Cordes