Access Control for Efficient Query Processing on Limited Resource Mobile Terminal

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient and Robust Query Processing for Mobile Wireless Sensor Networks

We present CNFS, an algorithm for efficient and robust query processing for mobile wireless sensor networks. CNFS is a walk–based algorithm that is biased to visit nodes close to the source first. This bias is accomplished by collecting topology information about the network as the search progresses. This information is also used to tolerate changes in the network topology caused by node mobili...

متن کامل

Verifying resource access control on mobile interactive devices

A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by and improves on the Java security architecture used in Java-enabled mobile telephones. We extend the Java model to include access control permissions with multiplicities in order to allow to use a permission a certain...

متن کامل

Efficient Access Control in a Hierarchy for Hardware-limited Users

Access control in a hierarchy plays an important role for multi-user communication environments. Owing to the rapid progress of wireless networks, it is necessary to construct a low-computation dynamic access control scheme for hardware-limited users to obtain secure information. Therefore, we propose an efficient cryptographic key assignment scheme in which the cryptographic key of each user i...

متن کامل

An Efficient Access Control Model for Mobile Ad-Hoc Communities

Mobile ad-hoc networks support interactions and collaborations among autonomous devices by enabling users to share resources and provide services to each other, whether collaborations are for business or leisure purposes. It is therefore important to ensure that interactions are subject to authentication and access control in order to restrict access to only those resources and services that th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Korea Society of Computer and Information

سال: 2011

ISSN: 1598-849X

DOI: 10.9708/jksci.2011.16.8.019