Sciweavers

360 search results - page 12 / 72
» The design of integrating subliminal channel with access con...
Sort
View
CN
2007
137views more  CN 2007»
15 years 16 days ago
A survey on ultra wide band medium access control schemes
Ultra wideband (UWB) technology based primarily on the impulse radio paradigm has a huge potential for revolutionizing the world of digital communications especially wireless comm...
Ashima Gupta, Prasant Mohapatra
IWDC
2001
Springer
210views Communications» more  IWDC 2001»
15 years 5 months ago
Access Control Protocols for Interconnected WDM Rings in the DAVID Metro Network
DAVID (Data And Voice Integration over D-WDM) is a research project sponsored by the European Community aimed at the design of an optical packet-switched network for the transport ...
Andrea Bianco, Giulio Galante, Emilio Leonardi, Fa...
92
Voted
CCS
2003
ACM
15 years 5 months ago
Formal access control analysis in the software development process
Security is a crucial aspect in any modern software system. To ensure security in the final product, security requirements must be considered in the entire software development p...
Manuel Koch, Francesco Parisi-Presicce
105
Voted
PERCOM
2005
ACM
16 years 3 days ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
99
Voted
ECTEL
2007
Springer
15 years 6 months ago
Role Based Access Control for the Interaction with Search Engines
Search engine-based features are a basic interaction mean for users to find information inside a Web-based Learning Management Systems (LMS); nonetheless, traditional solutions la...
Alessandro Bozzon, Tereza Iofciu, Wolfgang Nejdl, ...