Sciweavers

868 search results - page 52 / 174
» Resiliency policies in access control
Sort
View
CSE
2009
IEEE
15 years 6 months ago
A Framework for Enforcing Constrained RBAC Policies
—Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the pol...
Jason Crampton, Hemanth Khambhammettu
CORR
2008
Springer
84views Education» more  CORR 2008»
14 years 12 months ago
Rate and Power Allocation in Fading Multiple Access Channels
Abstract-- We consider the problem of rate and power allocation in a fading multiple-access channel. Our objective is to obtain rate and power allocation policies that maximize a u...
Ali ParandehGheibi, Atilla Eryilmaz, Asuman E. Ozd...
CNIS
2006
15 years 1 months ago
STRBAC - An approach towards spatio-temporal role-based access control
The rapid emergence of GPS enabled devices, sensors and mobile equipment in commercial as well as government organizations has led to considerable research in time- and location-b...
Mahendra Kumar, Richard E. Newman
ESORICS
2009
Springer
16 years 13 days ago
A Privacy Preservation Model for Facebook-Style Social Network Systems
Abstract. Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind t...
Philip W. L. Fong, Mohd M. Anwar, Zhen Zhao
INFOCOM
2009
IEEE
15 years 6 months ago
FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks
—Distributed sensor data storage and retrieval has gained increasing popularity in recent years for supporting various applications. While distributed architecture enjoys a more ...
Shucheng Yu, Kui Ren, Wenjing Lou