Sciweavers

868 search results - page 21 / 174
» Resiliency policies in access control
Sort
View
88
Voted
INFOCOM
2003
IEEE
15 years 5 months ago
Congestion Control Policies for IP-based CDMA Radio Access Networks
— As CDMA-based cellular networks mature, the current point-to-point links used in connecting base stations to network controllers will evolve to an IP-based Radio Access Network...
Sneha Kumar Kasera, Ramachandran Ramjee, Sandra R....
CSFW
2006
IEEE
15 years 5 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
ACSAC
2008
IEEE
15 years 6 months ago
Enforcing Role-Based Access Control Policies in Web Services with UML and OCL
Karsten Sohr, Tanveer Mustafa, Xinyu Bao, Gail-Joo...
ICEIS
2008
IEEE
15 years 6 months ago
Succinct Access Control Policies for Published XML Datasets
Tomasz Müldner, Jan Krzysztof Miziolek, Grego...