Sciweavers

3712 search results - page 171 / 743
» Role-Based Access Control
Sort
View
JIPS
2010
152views more  JIPS 2010»
14 years 8 months ago
Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Wireless sensor networks consist of sensor nodes which are expected to be battery-powered and are hard to replace or recharge. Thus, reducing the energy consumption of sensor nodes...
Dae-Suk Yoo, Seung Sik Choi
IACR
2011
223views more  IACR 2011»
14 years 1 months ago
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping
Abstract. We describe and analyze the password-based key establishment protocol PACE v2 Integrated Mapping (IM), an evolution of PACE v1 jointly proposed by Gemalto and Sagem S´ec...
Jean-Sébastien Coron, Aline Gouget, Thomas ...
130
Voted
ECIS
2000
15 years 3 months ago
Secure Access to Medical Data over the Internet
The concept of context-dependent access control has emerged during the last years: Information about the state of a process model of a working environment is combined with general ...
Ulrich Ultes-Nitsche, Stephanie Teufel
MCETECH
2009
Springer
15 years 8 months ago
A Non-technical User-Oriented Display Notation for XACML Conditions
Access control rules are currently administered by highly qualified personnel. Thus, the technical barrier that specialized access control languages represent naturally prevents th...
Bernard Stepien, Amy P. Felty, Stan Matwin