Sciweavers

926 search results - page 97 / 186
» Policy framings for access control
Sort
View
ICPP
2009
IEEE
15 years 5 months ago
Performance Limits of Fair-Access in Underwater Sensor Networks
—This paper investigates fundamental performance limits of medium access control (MAC) protocols for particular underwater multi-hop sensor networks under a fair-access criterion...
Yang Xiao, Miao Peng, John H. Gibson, Geoffrey G. ...
78
Voted
POLICY
2007
Springer
15 years 5 months ago
Towards Privacy-Aware Handling of Authorizations
Privacy issues have hindered centralised authentication approaches from being adopted by a wide range of users. This also applies to authorizations which suffer from privacy probl...
Wolfgang Dobmeier, Günther Pernul
88
Voted
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
15 years 4 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
139
Voted
VTC
2008
IEEE
185views Communications» more  VTC 2008»
15 years 5 months ago
Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios
This paper considers a scenario in which a secondary user makes opportunistic use of a channel allocated to some primary network. The primary network operates in a time-slotted ma...
Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong...
AINA
2007
IEEE
15 years 5 months ago
Enforcing Fine-Grained Authorization Policies for Java Mobile Agents
The Mobile Agent (MA) paradigm advocates the migration of agent code to achieve computational goals. MAs require an executable environment on hosts where mobile code can be execut...
Giovanni Russello, Changyu Dong, Naranker Dulay