Sciweavers

926 search results - page 159 / 186
» Policy framings for access control
Sort
View
CCS
2001
ACM
15 years 2 months ago
Interoperable strategies in automated trust negotiation
Automated trust negotiation is an approach to establishing trust between strangers through the exchange of digital credentials and the use of access control policies that specify ...
Ting Yu, Marianne Winslett, Kent E. Seamons
MOBICOM
1998
ACM
15 years 2 months ago
On Programmable Universal Mobile Channels in a Cellular Internet
In this paper we introduce universal mobile channels, a le communications abstraction that enables users and service providers to program application-speci c adaptive mobile servi...
Raymond R.-F. Liao, Andrew T. Campbell
84
Voted
GLOBECOM
2007
IEEE
15 years 4 months ago
Constrained Stochastic Games in Wireless Networks
—We consider the situation where N nodes share a common access point. With each node i there is an associated buffer and channel state that change in time. Node i dynamically cho...
Eitan Altaian, Konstantin Avrachenkov, Nicolas Bon...
94
Voted
SAINT
2005
IEEE
15 years 3 months ago
A Context-centric Security Middleware for Service Provisioning in Pervasive Computing
Pervasive user mobility, wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning. An emerging architecture ...
Antonio Corradi, Rebecca Montanari, Daniela Tibald...
GRID
2005
Springer
15 years 3 months ago
Protecting grid data transfer services with active network interfaces
A key goal of grid computing is to provide seamless access to shared computational and data resources across organizational boundaries, in distributed virtual organizations. Grid ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...