Sciweavers

804 search results - page 7 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
68
Voted
ICASSP
2008
IEEE
15 years 3 months ago
Power control in spectrum overlay networks: How to cross a multi-lane highway
—We consider power control in spectrum overlay networks (also referred to as opportunistic spectrum access) where secondary users identify and exploit instantaneous and local spe...
Wei Ren, Qing Zhao, Ashwin Swami
ESORICS
2009
Springer
15 years 4 months ago
Visualizing Privacy Implications of Access Control Policies in Social Network Systems
Wehypothesizethat, inaFacebook-stylesocial networksystem, proper visualization of one’s extended neighbourhood could help the user understand the privacy implications of her acce...
Mohd M. Anwar, Philip W. L. Fong, Xue-Dong Yang, H...
98
Voted
IFIP
2010
Springer
14 years 4 months ago
Cryptographic Enforcement of Role-Based Access Control
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
Jason Crampton
ISPEC
2005
Springer
15 years 3 months ago
A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications
Abstract. Access control is a system-wide concern that has both a generic nature and an application dependent characteristic. It is generic as many functions must be protected with...
Kung Chen, Chih-Mao Huang
DOA
2001
94views more  DOA 2001»
14 years 11 months ago
How to Monitor and Control Resource Usage in Mobile Agent Systems
The Mobile Agent technology has already shown its advantages, but at the same time has already remarked new problems currently limiting its diffusion in commercial environments. A...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...