Sciweavers

704 search results - page 35 / 141
» Resource Access Control for an Internet User Agent
Sort
View
SAC
2010
ACM
15 years 4 months ago
A simple role mining algorithm
Complex organizations need to establish access control policies in order to manage access to restricted resources. Role Based Access Control paradigm has been introduced in ’90 ...
Carlo Blundo, Stelvio Cimato
SAC
2002
ACM
14 years 9 months ago
Secure mobile agent systems using Java: where are we heading?
Java is the predominant language for mobile agent systems, both for implementing mobile agent execution environments and for writing mobile agent applications. This is due to inhe...
Walter Binder, Volker Roth
COLCOM
2009
IEEE
15 years 2 months ago
The Quality Social Network: A collaborative environment for personalizing Web access
—In this paper, we present a collaborative social networking environment, referred to as Quality Social Network (QSN), which enhances the social tagging paradigm by using it as a...
Andrea Perego, Barbara Carminati, Elena Ferrari
MMNS
2003
135views Multimedia» more  MMNS 2003»
14 years 11 months ago
Pervasive Accounting of Resource Consumption for Wireless Services with Adaptive QoS
Wireless communications and device miniaturization are enabling pervasive scenarios where the limited resource availability and the wide heterogeneity of access terminals make cruc...
Paolo Bellavista, Antonio Corradi, Silvia Vecchi
MMMACNS
2005
Springer
15 years 3 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...