Sciweavers

2209 search results - page 115 / 442
» Language Based Secure Communication
Sort
View
GLOBECOM
2007
IEEE
15 years 11 months ago
A Secure Data Transmission Scheme for Mobile Ad Hoc Networks
— We propose a secure data transmission scheme that takes advantage of node mobility. The scheme is based on the observation that due to mobility, messages sent at different time...
Qunwei Zheng, Xiaoyan Hong, Jun Liu, Lei Tang
163
Voted
SACMAT
2010
ACM
15 years 9 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
164
Voted
ACSAC
2002
IEEE
15 years 9 months ago
A Model for Attribute-Based User-Role Assignment
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles, based on a specific enterprise policy, thereby authorizing them to ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu
ICCHP
2010
Springer
15 years 3 months ago
SportSign: A Service to Make Sports News Accessible to Deaf Persons in Sign Languages
Sports are important in the life of deaf, as well as hearing persons, on physical, social and mental levels. However, despite that there exist many deaf sports organization in the ...
Achraf Othman, Oussama El Ghoul, Mohamed Jemni
SIGCOMM
2010
ACM
15 years 5 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long