Sciweavers

243 search results - page 16 / 49
» Location-Aware Authentication and Access Control
Sort
View
NGC
2001
Springer
116views Communications» more  NGC 2001»
15 years 1 months ago
Scalable IP Multicast Sender Access Control for Bi-directional Trees
Bi-directional shared tree is an efficient routing scheme for interactive multicast applications with multiple sources. Given the open-group IP multicast service model, it is impor...
Ning Wang, George Pavlou
SAC
2005
ACM
15 years 3 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla
GRID
2006
Springer
14 years 9 months ago
Cacheable Decentralized Groups for Grid Resource Access Control
Abstract-- Sharing data among collaborators in widely distributed systems remains a challenge due to limitations with existing methods for defining groups across administrative dom...
Jeffrey Hemmes, Douglas Thain
CSREAEEE
2006
149views Business» more  CSREAEEE 2006»
14 years 11 months ago
ALE Application Framework for Constructing Effective RFID Application
- RFID technology could greatly improve the business efficiency. EPCglobal Network suggests a kind of interface, called ALE (Application Level Events), for an efficient RFID develo...
Kyuhee An, Mokdong Chung
OZCHI
2006
ACM
15 years 3 months ago
Question-based group authentication
There are various situations where a distinction needs to be made between group members and outsiders. For example, to protect students in chat groups from unpleasant incidents ca...
Ann Nosseir, Richard C. H. Connor, Karen Renaud