Sciweavers

186 search results - page 13 / 38
» Efficient Access Control for Composite Applications
Sort
View
JNW
2006
94views more  JNW 2006»
14 years 9 months ago
An Efficient Role Specification Management Model for Highly Distributed Environments
Abstract--Highly distributed environments such as pervasive computing environments not having global or broad control, need another attribute certificate management technique. For ...
Soomi Yang
INFOCOM
2010
IEEE
14 years 7 months ago
Energy Efficient Algorithms for the RFID Estimation Problem
RFID has been gaining popularity for inventory control, object tracking, and supply chain management in warehouses, retail stores, hospitals, etc. Periodically and automatically es...
Tao Li, Samuel Wu, Shigang Chen, Mark Yang
ACSAC
2001
IEEE
15 years 1 months ago
The Authorization Service of Tivoli Policy Director
This paper presents the Authorization Service provided by Tivoli Policy Director (PD) and its use by PD family members as well as third-party applications. Policies are defined ov...
Günter Karjoth
CSREASAM
2009
14 years 10 months ago
Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy
- Until recently the reasons for reduced efficiency and limited implementation of new security systems has been the insufficient performance of hardware that executes access contro...
Vladimir S. Zaborovsky, Anton Titov
COBUILD
1999
Springer
15 years 1 months ago
OWL: An Object-Oriented Framework for Intelligent Home and Office Applications
The goal of OWL (Object-Oriented Workplace Laboratory) is to provide an object-oriented and component-based framework that supports the engineering of applications for the design, ...
Bernd Brügge, Ralf Pfleghar, Thomas Reicher