Sciweavers

602 search results - page 32 / 121
» An access control model for mobile physical objects
Sort
View
123
Voted
CSREASAM
2006
15 years 3 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
211
Voted
MICROMACHINES
2011
14 years 8 months ago
Modeling Self-Assembly Across Scales: The Unifying Perspective of Smart Minimal Particles
: A wealth of current research in microengineering aims at fabricating devices of increasing complexity, notably by (self-)assembling elementary components into heterogeneous funct...
Massimo Mastrangeli, Grégory Mermoud, Alche...
113
Voted
CSSE
2004
IEEE
15 years 1 months ago
AdOrBAC: an administration model for Or-BAC
Even though the final objective of an access control model is to provide a framework to decide if actions performed by subjects on objects are permitted or not, it is not convenie...
Frédéric Cuppens, Alexandre Mi&egrav...
MSWIM
2005
ACM
15 years 7 months ago
Using statistical design of experiments for analyzing mobile ad hoc networks
The performance of mobile ad hoc networks can be influenced by numerous factors, including protocol design at every layer; parameter settings such as retransmission limits and ti...
Michael W. Totaro, Dmitri D. Perkins
SAC
2003
ACM
15 years 7 months ago
UbiData: Ubiquitous Mobile File Service
One of the most challenging objectives of mobile data management is the ubiquitous, any time, anywhere access. This objective is very difficult to meet due to several network and ...
Jinsuo Zhang, Abdelsalam Helal, Joachim Hammer