Sciweavers

2797 search results - page 149 / 560
» Control Structures
Sort
View
133
Voted
SAMOS
2007
Springer
15 years 9 months ago
k  +   Neigh : An Energy Efficient Topology Control for Wireless Sensor Networks
For most applications in wireless sensor networks (WSNs), it is often assumed that the deployment of sensor nodes is unmanaged and random, so the density of local node may vary thr...
Dong-Min Son, Young-Bae Ko
91
Voted
SEMWEB
2007
Springer
15 years 9 months ago
Access Control for Sharing Semantic Data across Desktops
Abstract. Personal Information Management (PIM) systems aim to provide convenient access to all data and metadata on a desktop to the user itself as well as the co-workers. Obvious...
Ekaterini Ioannou, Juri Luca De Coi, Arne Wolf Koe...
104
Voted
ACSAC
2006
IEEE
15 years 8 months ago
A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs
In healthcare, role-based access control systems are often extended with exception mechanisms to ensure access to needed informationeven when the needs don’t followthe expected ...
Lillian Røstad, Ole Edsberg
128
Voted
CONCUR
2004
Springer
15 years 8 months ago
Type Based Discretionary Access Control
Abstract. Discretionary Access Control (DAC) systems provide powerful mechanisms for resource management based on the selective distribution of capabilities to selected classes of ...
Michele Bugliesi, Dario Colazzo, Silvia Crafa
134
Voted
ACSAC
2002
IEEE
15 years 7 months ago
Advanced Features for Enterprise-Wide Role-Based Access Control
The administration of users and access rights in large enterprises is a complex and challenging task. Roles are a powerful concept for simplifying access control, but their implem...
Axel Kern