Sciweavers

837 search results - page 111 / 168
» Rewriting-Based Access Control Policies
Sort
View
IADIS
2003
15 years 2 months ago
Integrating RBAC Mechanisms in a Web Server
Hypermedia systems (whether web sites or not) should support multilevel policiesm, offering different views and manipulation abilities of the same information to users with differ...
Daniel Sanz-García, Paloma Díaz, Ign...
95
Voted
ACJ
2006
85views more  ACJ 2006»
15 years 20 days ago
Tree Automata for Schema-Level Filtering of XML Associations
In this paper we present query filtering techniques based on bottom-up tree automata for XML access control. In our authorization model (RXACL), RDF statements are used to represen...
Vaibhav Gowadia, Csilla Farkas
122
Voted
ICC
2008
IEEE
133views Communications» more  ICC 2008»
15 years 7 months ago
Call Admission Control for Mobile Agent Based Handoff in Wireless Mesh Networks
Abstract—Wireless mesh network (WMN) has emerged recently as a promising technology for next-generation wireless networking. In WMN, it is important to provide an efficient hand...
Bo Rong, Yi Qian, Kejie Lu, Michel Kadoch
101
Voted
VTC
2008
IEEE
152views Communications» more  VTC 2008»
15 years 7 months ago
Network Controlled Joint Radio Resource Management for Heterogeneous Networks
Abstract— In this paper, we propose a way of achieving optimality in radio resource management (RRM) for heterogeneous networks. We consider a micro or femto cell with two co-loc...
Marceau Coupechoux, Jean Marc Kelif, Philippe Godl...
80
Voted
SASO
2007
IEEE
15 years 6 months ago
Shruti: A Self-Tuning Hierarchical Aggregation System
Current aggregation systems either have a single inbuilt aggregation mechanism or require applications to specify an aggregation policy a priori. It is hard to predict the read an...
Praveen Yalagandula, Michael Dahlin