Sciweavers

1000 search results - page 25 / 200
» Application Access Control at Network Level
Sort
View
ICDCSW
2003
IEEE
15 years 7 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
DEBS
2008
ACM
15 years 3 months ago
Access control in publish/subscribe systems
Two convincing paradigms have emerged for achieving scalability in widely distributed systems: publish/subscribe communication and role-based, policy-driven control of access to t...
Jean Bacon, David M. Eyers, Jatinder Singh, Peter ...
ACSAC
2002
IEEE
15 years 6 months ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...
IEAAIE
2003
Springer
15 years 7 months ago
UMAS Learning Requirement for Controlling Network Resources
- This paper presents an intelligent User Manager Agent System (UMAS) in which it has a capability of making a management decision for balancing the network load with the users’ ...
Abdullah Gani, Nasser Abouzakhar, Gordon A. Manson
SACMAT
2010
ACM
15 years 6 months ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum