Sciweavers

298 search results - page 40 / 60
» Reconciling role based management and role based access cont...
Sort
View
PERCOM
2006
ACM
15 years 9 months ago
Context-Aware Resource Management in Multi-Inhabitant Smart Homes: A Nash H-Learning based Approach
A smart home aims at building intelligence automation with a goal to provide its inhabitants with maximum possible comfort, minimize the resource consumption and thus overall cost...
Nirmalya Roy, Abhishek Roy, Sajal K. Das
IMECS
2007
14 years 11 months ago
Multi-Application Authentication Based on Multi-Agent System
— This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infras...
Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Jun...
ACSAC
2009
IEEE
15 years 4 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...
ICC
2008
IEEE
159views Communications» more  ICC 2008»
15 years 3 months ago
A Performance Study of Mobile Handoff Delay in IEEE 802.11-Based Wireless Mesh Networks
— Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. One important component of realizing large-...
Akshay Mangalam Srivatsa, Jiang Xie
IMCS
2007
77views more  IMCS 2007»
14 years 9 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...