Sciweavers

1517 search results - page 134 / 304
» Time and Location Based Services with Access Control
Sort
View
IEEEARES
2007
IEEE
15 years 4 months ago
Security Requirements for a Semantic Service-oriented Architecture
Service-oriented architectures (SOAs) are a commonly used paradigm for IT infrastructures in various fields. Due to their flexibility and the easy accessibility of their underly...
Stefan Durbeck, Rolf Schillinger, Jan Kolter
SACMAT
2009
ACM
15 years 4 months ago
Supporting RBAC with XACML+OWL
XACML does not natively support RBAC and even the specialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty. Exte...
Rodolfo Ferrini, Elisa Bertino
WETICE
1998
IEEE
15 years 2 months ago
Using SESAME's GSS-API to add Security to Unix Applications
SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an ext...
Paul Ashley, Mark Vandenwauver, Mark Rutherford, S...
VTC
2008
IEEE
125views Communications» more  VTC 2008»
15 years 4 months ago
Wireless Broadband Services using Smart Caching
— Broadband access for all will be a key functionality in future mobile radio networks. Depending on the length and the characteristic of the radio wave propagation the performan...
Stephan Goebbels
IPPS
2008
IEEE
15 years 4 months ago
Self-stabilizing population of mobile agents
We investigate a problem of maintaining a target population of mobile agents in a distributed system. The purpose of the agents is to perform certain activities, so the goal is to...
Zbigniew Golebiewski, Miroslaw Kutylowski, Tomasz ...