Sciweavers

304 search results - page 24 / 61
» Future Directions in Role-Based Access Control Models
Sort
View
SACMAT
2010
ACM
15 years 4 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
ATAL
2003
Springer
15 years 5 months ago
Communication for Goal Directed Agents
This paper discusses some modeling issues concerning the communication between goal-directed agents. In particular, the role of performatives in agent communication is discussed. I...
Mehdi Dastani, Jeroen van der Ham, Frank Dignum
PCI
2009
Springer
15 years 4 months ago
A Foundation for Defining Security Requirements in Grid Computing
—Despite the wide adoption by the scientific community, grid technologies have not been given the appropriate attention by enterprises. This is merely due to the lack of enough s...
Antonios Gouglidis, Ioannis Mavridis
GLOBECOM
2006
IEEE
15 years 5 months ago
Adaptive Network Resource Management in IEEE 802.11 Wireless Random Access MAC
— Effective and efficient management of wireless network resources is attracting more and more research attention, due to the rapid growing deployment of wireless mesh and ad hoc...
Hao Wang, Changcheng Huang, James Yan
ICDIM
2007
IEEE
15 years 6 months ago
Context-aware security service in RFID/USN environments using MAUT and extended GRBAC
: This paper proposes a context-aware security service providing multiple authentications and authorization from a Security Level which is decided dynamically in a context-aware en...
Kiyeal Lee, Seokhwan Yang, Sungik Jun, Mokdong Chu...