Sciweavers

3712 search results - page 493 / 743
» Role-Based Access Control
Sort
View
IJNSEC
2006
88views more  IJNSEC 2006»
15 years 4 months ago
Secure Internet Applications Based on Mobile Agents
The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server mo...
Cungang Yang
141
Voted
JCM
2006
86views more  JCM 2006»
15 years 4 months ago
MAC Layer RFID Protocol for Low Cost Object Identification
In this paper, we introduce a novel medium access control (MAC) protocol for Radio Frequency Identification (RFID) systems. This protocol exploits the Markov Chain Model of Slotted...
Shweta Singh
ENTCS
2007
112views more  ENTCS 2007»
15 years 4 months ago
A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
ENTCS
2007
199views more  ENTCS 2007»
15 years 4 months ago
Heuristics for Safety and Security Constraints
The flow logic approach to static analysis amounts to specifying the admissibility of solutions to analysis problems; when specified using formulae in stratified alternation-fr...
Flemming Nielson, Hanne Riis Nielson
IJAMC
2007
152views more  IJAMC 2007»
15 years 4 months ago
Navigating a 3D virtual environment of learning objects by hand gestures
: This paper presents a gesture-based Human-Computer Interface (HCI) to navigate a learning object repository mapped in a 3D virtual environment. With this interface, the user can ...
Qing Chen, Abu Saleh Md. Mahfujur Rahman, Xiaojun ...