Sciweavers

715 search results - page 124 / 143
» On Run-Time Enforcement of Policies
Sort
View
ESORICS
2004
Springer
15 years 3 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
DISCEX
2003
IEEE
15 years 3 months ago
Integrated Security Services for Dynamic Coalitions
Coalitions are collaborative networks of autonomous domains where resource sharing is achieved by the distribution of access permissions to coalition members based on negotiated r...
Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bo...
CAISE
2003
Springer
15 years 3 months ago
Path-Stamps: A Proposal for Enhancing Security of Location Tracking Applications
Location tracking technologies are penetrating increasingly in industrial environments. Several challenges arise when people or mobile assets are tracked. Security is one of the ma...
Ana Isabel González-Tablas Ferreres, Benjam...
COOPIS
2002
IEEE
15 years 2 months ago
Object Security Attributes: Enabling Application-Specific Access Control in Middleware
This paper makes two main contributions towards establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification...
Konstantin Beznosov
CDC
2009
IEEE
118views Control Systems» more  CDC 2009»
15 years 2 months ago
Opportunistic scheduling in cellular systems in the presence of non-cooperative mobiles
Abstract— A central scheduling problem in wireless communications is that of allocating resources to one of many mobile stations that have a common radio channel. Much attention ...
Kavitha Veeraruna, Eitan Altman, Rachid El Azouzi,...