This paper describes a conceptual model for attribute aggregation that allows a service provider (SP) to authorise a user’s access request based on attributes asserted by multip...
David W. Chadwick, George Inman, Nate Klingenstein
Applications in Computer Networks often require high throughput access to large data structures for lookup and classification. Many advanced algorithms exist to speed these searc...
We have developed a 3D sound system for headphones that allows real-time sound source and user displacement in a virtual acoustic environment. Because of a flexible design that us...
— This paper presents the ALCA (Asymmetric Link Collision Avoidance) protocol. ALCA was designed to deal with a known deficiency of the Basic Scheme [1] for power control in 802...
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...