Sciweavers

445 search results - page 36 / 89
» Authorization and Access Control in IRO-DB
Sort
View
ESORICS
2007
Springer
15 years 3 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...
ADHOC
2006
95views more  ADHOC 2006»
14 years 9 months ago
LHAP: A lightweight network access control protocol for ad hoc networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the ...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
CSSE
2004
IEEE
14 years 9 months ago
Specifying multimedia access control using RDF
The Synchronized Multimedia Integration Language (SMIL) [Aya01] is an W3C [W3C03] specification for authoring multimedia documents. Although SMIL has XML like syntactic constructs...
Naren Kodali, Csilla Farkas, Duminda Wijesekera
COMPSAC
2004
IEEE
15 years 1 months ago
A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy
Considering the solution of dynamic access problems in a user hierarchy, a novel scheme based on one-way hash function is proposed to manage the cryptographic keys in the paper. T...
Tzer-Shyong Chen, Yu-Fang Chung, Chang-Sin Tian
104
Voted
PST
2008
14 years 11 months ago
An Access Control Scheme for Protecting Personal Data
This paper presents a new personal data access control (PDAC) scheme that is inspired by the protection schemes practiced in communities for sharing valuable commodities. The PDAC...
Wilfred Villegas, Bader Ali, Muthucumaru Maheswara...