Sciweavers

705 search results - page 57 / 141
» Security Policy Coordination for Heterogeneous Information S...
Sort
View
WPES
2003
ACM
15 years 3 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
LOCA
2009
Springer
15 years 4 months ago
LOCK: A Highly Accurate, Easy-to-Use Location-Based Access Control System
With proliferation of ubiquitous computing, digital access is facing an increasing risk since unauthorized client located at any place may intrude a local server. Location Based Ac...
Yongcai Wang, Junhui Zhao, Toshikazu Fukushima
HICSS
2000
IEEE
160views Biometrics» more  HICSS 2000»
15 years 2 months ago
Analysis of Coordinated Multilateral Trades
A new operating paradigm is still needed for the power industry in order to achieve a workable deregulated market. The two main proposals, namely the Bilateral and the Poolco mode...
Pierre-François D. Quet, Jose B. Cruz Jr., ...
RTSS
2003
IEEE
15 years 3 months ago
Addressing Timeliness/Accuracy/Cost Tradeoffs in Information Collection for Dynamic Environments
In this paper, we focus on addressing the tradeoffs between timeliness, accuracy and cost for applications requiring real-time information collection in distributed real-time envi...
Qi Han, Nalini Venkatasubramanian
SACMAT
2010
ACM
14 years 8 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino