Sciweavers

430 search results - page 4 / 86
» Efficient Proving for Practical Distributed Access-Control S...
Sort
View
DEBS
2007
ACM
15 years 1 months ago
Encryption-enforced access control in dynamic multi-domain publish/subscribe networks
Publish/subscribe systems provide an efficient, event-based, wide-area distributed communications infrastructure. Large scale publish/subscribe systems are likely to employ compon...
Lauri I. W. Pesonen, David M. Eyers, Jean Bacon
SACMAT
2010
ACM
15 years 2 months ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
TPDS
1998
94views more  TPDS 1998»
14 years 9 months ago
Access Control and Signatures via Quorum Secret Sharing
—We suggest a method of controlling the access to a secure database via quorum systems. A quorum system is a collection of sets (quorums) every two of which have a nonempty inter...
Moni Naor, Avishai Wool
ICFP
2003
ACM
15 years 9 months ago
A static type system for JVM access control
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementat...
Tomoyuki Higuchi, Atsushi Ohori
HICSS
2003
IEEE
156views Biometrics» more  HICSS 2003»
15 years 2 months ago
Quality-of-Service-Oriented Media Access Control for Advanced Mobile Multimedia Satellite Systems
Satellite networks offer a number of desirable characteristics including wide area coverage, unique broadcast capabilities, the ability to communicate with hand-held devices, and ...
Petia Todorova, Alexander Markhasin