Sciweavers

579 search results - page 88 / 116
» Security Enforcement Model for Distributed Usage Control
Sort
View
148
Voted
SPC
2005
Springer
15 years 8 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
130
Voted
JUCS
2006
86views more  JUCS 2006»
15 years 2 months ago
Secure Service Discovery based on Trust Management for ad-hoc Networks
Abstract: In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to discover services ...
Celeste Campo, Florina Almenárez Mendoza, D...
131
Voted
LCN
2006
IEEE
15 years 8 months ago
The Internet Group Management Protocol with Access Control (IGMP-AC)
IP Multicast is best known for its bandwidth conservation and lower resource utilization. The classical model of multicast makes it difficult to permit access only to authorized ...
Salekul Islam, J. William Atwood
ER
2004
Springer
169views Database» more  ER 2004»
15 years 8 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
ICC
2007
IEEE
228views Communications» more  ICC 2007»
15 years 9 months ago
A Non-Cooperative Power Control Game for Secondary Spectrum Sharing
—Limited spectrum resources, inefficient spectrum usage and increasing wireless communication necessitates a paradigm shift from the current fixed spectrum management policy to...
Juncheng Jia, Qian Zhang