Sciweavers

5252 search results - page 95 / 1051
» Logic in Access Control
Sort
View
ASWC
2006
Springer
15 years 7 months ago
A Semantic Search Conceptual Model and Application in Security Access Control
Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
Kunmei Wen, Zhengding Lu, Ruixuan Li, Xiaolin Sun,...
DBSEC
2006
124views Database» more  DBSEC 2006»
15 years 6 months ago
Consolidating the Access Control of Composite Applications and Workflows
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
JHSN
2006
267views more  JHSN 2006»
15 years 5 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
ARESEC
2011
145views more  ARESEC 2011»
14 years 5 months ago
An Attribute Based Framework for Risk-Adaptive Access Control Models
—The concept of risk-based adaptive access control (RAdAC, pronounced Raid-ack) has been recently introduced in the literature. It seeks to automatically (or semi-automatically) ...
Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipat...
GLOBECOM
2006
IEEE
15 years 11 months ago
Distributed Medium Access Control in Pulse-Based Time-Hopping UWB Wireless Networks
— This paper investigates distributed medium access control (MAC) to achieve rate guarantee in pulse-based timehopping ultra-wideband (UWB) wireless networks, where the inherent ...
Hai Jiang, Kuang-Hao Liu, Weihua Zhuang, Xuemin Sh...