Sciweavers

596 search results - page 28 / 120
» Theories of Access Consciousness
Sort
View
80
Voted
CCS
2008
ACM
15 years 28 days ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
127
Voted
SEC
2003
15 years 8 days ago
Providing Voice Privacy Over Public Switched Telephone Networks
: The public telephone network has been evolving from manually switched wires carrying analog encoded voice of the 19th century to an automatically switched grid of copper-wired, f...
Mohamed Sharif, Duminda Wijesekera
ICDIM
2007
IEEE
15 years 5 months ago
Route navigation method for disabled access GIS in consideration of abilities and psychologies
: This paper aims to propose a route navigation method for disabled access GIS. We focused the disabled’s psychologies as well as their physical conditions. This paper represents...
Shinobu Izumi, Go Kobayashi, Takaichi Yoshida
ICDCS
2006
IEEE
15 years 5 months ago
On the Access Pricing Issues of Wireless Mesh Networks
This paper studies the use of pricing as an incentive mechanism to encourage private, self-interested nodes to participate in a public wireless mesh network and cooperate in the p...
Ray K. Lam, John C. S. Lui, Dah-Ming Chiu
76
Voted
ICDT
2005
ACM
130views Database» more  ICDT 2005»
15 years 4 months ago
Rewriting Queries Using Views with Access Patterns Under Integrity Constraints
We study the problem of rewriting queries using views in the presence of access patterns, integrity constraints, disjunction, and negation. We provide asymptotically optimal algori...
Alin Deutsch, Bertram Ludäscher, Alan Nash