Sciweavers

370 search results - page 37 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
GLOBECOM
2009
IEEE
15 years 5 months ago
Collision-Free Asynchronous Multi-Channel Access in Ad Hoc Networks
Abstract—In this paper, we present a collision-free asynchronous multi-channel access protocol for Ad Hoc wireless networks using a single transceiver. Our protocol, dubbed AMMAC...
Duy Nguyen, J. J. Garcia-Luna-Aceves, Katia Obracz...
WISE
2002
Springer
15 years 6 months ago
Towards Translating Authorizations for Transformed XML Documents
Web based services and applications have increased the availability and accessibility of information. XML has recently emerged as an important standard in the area of information ...
Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko K...
PROFES
2004
Springer
15 years 7 months ago
Development of a Normative Package for Safety-Critical Software Using Formal Regulatory Requirements
Abstract. The important tasks in requirement engineering are resolving requirements inconsistencies between regulators and developers of safety-critical computer systems, and the v...
Sergiy A. Vilkomir, Aditya K. Ghose
ETRICS
2006
15 years 5 months ago
Optimized Workflow Authorization in Service Oriented Architectures
Abstract. Complex business processes are usually realized by specifying the integration and interaction of smaller modular software components. For example, hitherto monolithic ent...
Martin Wimmer, Martina-Cezara Albutiu, Alfons Kemp...
ACJ
2006
85views more  ACJ 2006»
15 years 2 months ago
Tree Automata for Schema-Level Filtering of XML Associations
In this paper we present query filtering techniques based on bottom-up tree automata for XML access control. In our authorization model (RXACL), RDF statements are used to represen...
Vaibhav Gowadia, Csilla Farkas