Sciweavers

602 search results - page 30 / 121
» An access control model for mobile physical objects
Sort
View
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
15 years 2 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...
113
Voted
CCS
2006
ACM
15 years 5 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
IFIP
2004
Springer
15 years 7 months ago
High Throughput Route Selection in Multi-rate Ad Hoc Wireless Networks
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens
115
Voted
EUC
2005
Springer
15 years 7 months ago
A World Model for Smart Spaces
A world model for ubiquitous computing environments is presented. It can be dynamically organized like a tree based on geographical containment, such as in a user-room-floor-build...
Ichiro Satoh
MMMACNS
2010
Springer
15 years 7 days ago
Group-Centric Models for Secure and Agile Information Sharing
Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...