Sciweavers

445 search results - page 41 / 89
» Authorization and Access Control in IRO-DB
Sort
View
ICDCSW
2003
IEEE
15 years 3 months ago
Dynamic Resource Control for High-Speed Downlink Packet Access Wireless Channel
It is a challenging task to provide Quality of Service (QoS) control for a shared high-speed downlink packet access (HSDPA) wireless channel. In this paper, we first propose a ne...
Huai-Rong Shao, Chia Shen, Daqing Gu, Jinyun Zhang...
CSREASAM
2006
14 years 11 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
CSFW
2008
IEEE
15 years 4 months ago
Evidence-Based Audit
Authorization logics provide a principled and flexible approach to specifying access control policies. One of their compelling benefits is that a proof in the logic is evidence ...
Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, Steve...
SEC
2007
14 years 11 months ago
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy
Location-Based Access Control (LBAC) systems support the evaluation of conditions on locations in the enforcement of access control policies. The ability to evaluate conditions on ...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
MMMACNS
2010
Springer
14 years 8 months ago
Group-Centric Models for Secure and Agile Information Sharing
Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...