Sciweavers

379 search results - page 14 / 76
» Processing Logical Access Control Command in Computer System
Sort
View
FGCN
2008
IEEE
152views Communications» more  FGCN 2008»
15 years 6 months ago
Extending the UbiMDR Supporting Situation-Aware Access Control
Ubiquitous computing environment requirement needs information sharing of sensors based on sensor network technology, situation-aware and determination functions and other related...
Jeong-Dong Kim, Dongwon Jeong, Doo-Kwon Baik
SACMAT
2010
ACM
15 years 9 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
ICRA
2000
IEEE
118views Robotics» more  ICRA 2000»
15 years 8 months ago
4-D/RCS Reference Model Architecture for Unmanned Ground Vehicles
4-D/RCS is the reference model architecture currently being developed for the Demo III Experimental Unmanned Vehicle program. 4-D/RCS integrates the NIST (National Institute of St...
James S. Albus
ICSE
2003
IEEE-ACM
16 years 4 months ago
RUPi - A Unified Process that Integrates Human-Computer Interaction and Software Engineering
This research has the main objective of presenting a study on the areas of Human-Computer Interaction (HCI) and Software Engineering (SE), focusing on the importance of integratin...
Kênia Soares Sousa, Elizabeth Furtado
POLICY
2005
Springer
15 years 10 months ago
Automated Decomposition of Access Control Policies
Modern dynamic distributed information systems need access control policies to address controlling access to multiple resources that are distributed. The s may be considered as a ...
Linying Su, David W. Chadwick, Andrew Basden, Jame...