Sciweavers

370 search results - page 21 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
INFOCOM
2008
IEEE
15 years 8 months ago
A Scalable Method for Access Control in Location-Based Broadcast Services
Abstract. One important problem for such public broadcast LBS is to enforce access control on a large number of subscribers. In such a system a user typically subscribes to a LBS f...
Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Li...
ECOOP
1999
Springer
15 years 6 months ago
Providing Fine-grained Access Control for Java Programs
There is considerable interest in programs that can migrate from one host to another and execute. Mobile programs are appealing because they support efficient utilization of networ...
Raju Pandey, Brant Hashii
TWC
2010
14 years 8 months ago
Dynamic Spectrum Access Using a Network Coded Cognitive Control Channel
In this paper we propose a Dynamic Spectrum Access scheme which allows the users to opportunistically and efficiently access the channels available for communications. It addresses...
Nicola Baldo, Alfred Asterjadhi, Michele Zorzi
VLDB
1993
ACM
112views Database» more  VLDB 1993»
15 years 6 months ago
Specifying and Enforcing Intertask Dependencies
Extensions of the traditional atomic transaction model are needed to support the development of multi-system applications or work ows that access heterogeneous databases and legac...
Paul C. Attie, Munindar P. Singh, Amit P. Sheth, M...
SACMAT
2009
ACM
15 years 8 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang