Sciweavers

2655 search results - page 129 / 531
» Event Systems and Access Control
Sort
View
CCS
2004
ACM
15 years 10 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
CDC
2009
IEEE
123views Control Systems» more  CDC 2009»
15 years 9 months ago
On the myopic policy for a class of restless bandit problems with applications in dynamic multichannel access
We consider a class of restless multi-armed bandit problems that arises in multi-channel opportunistic communications, where channels are modeled as independent and stochastically...
Keqin Liu, Qing Zhao
CCS
2006
ACM
15 years 8 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
INTERACT
2007
15 years 6 months ago
FaericWorld: Browsing Multimedia Events Through Static Documents and Links
This paper describes a novel browsing paradigm, taking benefit of the various types of links (e.g. thematic, temporal, references, etc.) that can be automatically built between mul...
Maurizio Rigamonti, Denis Lalanne, Rolf Ingold
ETFA
2005
IEEE
15 years 10 months ago
Environmental control system based on mobile devices
AbstractThe impact of the use of mobile devices by means of GPRS (General Packet Radio Service) technology to access environmental information in real time, provided by sensors str...
T. Albero, V. Sempere, J. Silvestre, P. Dabbas