نتایج جستجو برای: media access control

تعداد نتایج: 1852182  

Journal: :J. Network and Computer Applications 2011
Yeong-Sheng Chen Yuan-Wei Lee Jong Hyuk Park

In broadband wireless networks, providing Quality of Service (QoS) support for multimedia traffics is no doubt crucial to many application requirements such as real-time audio and video streaming communications. IEEE 802.11e Medium Access Control (MAC) standard proposes Hybrid Coordination Function (HCF), which is composed of HCF Controlled Channel Access (HCCA) and Enhanced Distributed Channel...

2005
António Pinto Manuel Ricardo

Evolution is making telecom networks to converge towards all-IP communication scenarios where multiple services, including the broadcast of streaming video, are transported by IP packets. A possible solution for supporting multiple video channel transmissions with individual channel access control is by using secure IP multicast. In this paper the authors propose a solution for supporting the b...

Journal: :J. UCS 2017
Grzegorz Blinowski Krzysztof Szczypiorski

One of the areas in which wireless networks based on visible light communication (VLC) is considered superior to traditional radio-based communication is security. The common slogan summarizing VLC security features is WYSIWYS "What You See Is What You Send”. However, especially in the case of infrastructure downlink communication, security must be accounted for also in case of VLC. In this pap...

2006
Bih-Hwang Lee Hui-Cheng Lai

IEEE 802.11e provides the guaranteed quality of service (QoS) by providing different transmission priorities. IEEE 802.11e improves the media access control layer of IEEE 802.11 to satisfy the different QoS requirements by introducing two channel access functions: the enhanced distributed channel access (EDCA) and HCF controlled channel access (HCCA). Therefore, most devices support different t...

2015
Qasim Mahmood Rajpoot Christian Damsgaard Jensen Ram Krishnan

Attribute-based access control (ABAC) and role-based access control (RBAC) are currently the two most popular access control models. Yet, they both have known limitations and offer features complimentary to each other. Due to this fact, integration of RBAC and ABAC has recently emerged as an important area of research. In this paper, we propose an access control model that combines the two mode...

1997
Ravi S. Sandhu Venkata Bhamidipati

In role-based access control (RBAC) permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. The principal motivation behind RBAC is to simplify administration. An appealing possibility is to use RBAC itself to manage RBAC, to further provide administrative convenience. In this paper we introduce a role-based administrative...

2003
Gerald Vogt

Security of systems and management infrastructure is crucial for a successful, reliable and safe use. Most currently deployed systems are based on simple subject/object-relations where control of access happens. This has the drawback that any access decision occurs just on the behalf of the single subject accessing. In this paper we describe an extended access control model that allows to inclu...

1999
David Rosenthal Francis Fung

Two security domains that want to exchange information securely may need to agree on translations of Mandatory Access Control (MAC) labels of their information, if their MAC labels have a different syntax or semantics. It is desirable that these translations do not introduce any confidentiality violations. In this paper we present a property, the Security Level Translation Property (SLTP), whic...

1998
Lingling Hua Sylvia Osborn

In this paper, we show how to model UNIX file access using a rolebased approach. A role-based access control model is presented, and its use in reflecting the existing permissions in a UNIX environment is described.

2012
Cátia Santos-Pereira Luis Filipe Coelho Antunes Ricardo João Cruz Correia Ana Margarida Ferreira

American and European Legislation for protection of medical data agree that the patient has the right to play a pivotal role in the decisions regarding the content and distribution of her/his medical records. The Role Based Access Control (RBAC) model is the most commonly used authorization model in healthcare. The first goal of this work is to review if existing models and standards provide fo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید