Sciweavers

13180 search results - page 2296 / 2636
» Network Models
Sort
View
POLICY
2005
Springer
15 years 10 months ago
Automated Decomposition of Access Control Policies
Modern dynamic distributed information systems need access control policies to address controlling access to multiple resources that are distributed. The s may be considered as a ...
Linying Su, David W. Chadwick, Andrew Basden, Jame...
SOFSEM
2005
Springer
15 years 10 months ago
Volumes of 3D Drawings of Homogenous Product Graphs
d Abstract) Lubomir Torok Institute of Mathematics and Computer Science Slovak Academy of Sciences Severna 5, 974 01 Banska Bystrica, Slovak Republic 3-dimensional layout of graph...
Lubomir Torok
SPC
2005
Springer
15 years 10 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
SSD
2005
Springer
93views Database» more  SSD 2005»
15 years 10 months ago
Semantic Caching for Multiresolution Spatial Query Processing in Mobile Environments
Spatial data are particularly useful in mobile environments. However, due to the low bandwidth of most wireless networks, developing large spatial database applications becomes a c...
Sai Sun, Xiaofang Zhou, Heng Tao Shen
TCC
2005
Springer
88views Cryptology» more  TCC 2005»
15 years 10 months ago
Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation
Definition of security under the framework of Environmental Security (a.k.a Network-Aware Security or Universally Composable Security) typically requires “extractability” of t...
Manoj Prabhakaran, Amit Sahai
« Prev « First page 2296 / 2636 Last » Next »