Sciweavers

926 search results - page 50 / 186
» Policy framings for access control
Sort
View
CSE
2009
IEEE
15 years 5 months ago
A Framework for Enforcing Constrained RBAC Policies
—Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the pol...
Jason Crampton, Hemanth Khambhammettu
79
Voted
CORR
2008
Springer
84views Education» more  CORR 2008»
14 years 10 months ago
Rate and Power Allocation in Fading Multiple Access Channels
Abstract-- We consider the problem of rate and power allocation in a fading multiple-access channel. Our objective is to obtain rate and power allocation policies that maximize a u...
Ali ParandehGheibi, Atilla Eryilmaz, Asuman E. Ozd...
104
Voted
CNIS
2006
14 years 11 months ago
STRBAC - An approach towards spatio-temporal role-based access control
The rapid emergence of GPS enabled devices, sensors and mobile equipment in commercial as well as government organizations has led to considerable research in time- and location-b...
Mahendra Kumar, Richard E. Newman
69
Voted
SAINT
2006
IEEE
15 years 4 months ago
Comparison of Transmission Schemes for Framed ALOHA based RFID Protocols
The performance of RFID anti-collision protocols that are based on framed ALOHA depends on a transmission scheme that controls access to the shared channel. In this paper, we outl...
Christian Floerkemeier, Matthias Wille
78
Voted
ESORICS
2009
Springer
15 years 10 months ago
A Privacy Preservation Model for Facebook-Style Social Network Systems
Abstract. Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind t...
Philip W. L. Fong, Mohd M. Anwar, Zhen Zhao