Sciweavers

602 search results - page 19 / 121
» An access control model for mobile physical objects
Sort
View
INFOCOM
2006
IEEE
15 years 7 months ago
Extracting a Mobility Model from Real User Traces
Abstract— Understanding user mobility is critical for simulations of mobile devices in a wireless network, but current mobility models often do not reflect real user movements. ...
Minkyong Kim, David Kotz, Songkuk Kim
SACMAT
2006
ACM
15 years 7 months ago
Secure resource description framework: an access control model
In this paper we propose an access control model for the Resource Description Framework (RDF). We argue that existing access control models, like the ones developed for securing e...
Amit Jain, Csilla Farkas
148
Voted
JHSN
2006
267views more  JHSN 2006»
15 years 1 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
WEBI
2004
Springer
15 years 7 months ago
An Access Control Model for Web Services in Business Process
Business process describes a set of services that span enterprise boundaries and are provided by enterprises that see each other as partners. Web services is widely accepted and a...
Peng Liu, Zhong Chen
IPCCC
2005
IEEE
15 years 7 months ago
MMAC: a mobility-adaptive, collision-free MAC protocol for wireless sensor networks
Mobility in wireless sensor networks poses unique challenges to the medium access control (MAC) protocol design. Previous MAC protocols for sensor networks assume static sensor no...
Muneeb Ali, T. Suleman, Zartash Afzal Uzmi