نتایج جستجو برای: media access control
تعداد نتایج: 1852182 فیلتر نتایج به سال:
In broadband wireless networks, providing Quality of Service (QoS) support for multimedia traffics is no doubt crucial to many application requirements such as real-time audio and video streaming communications. IEEE 802.11e Medium Access Control (MAC) standard proposes Hybrid Coordination Function (HCF), which is composed of HCF Controlled Channel Access (HCCA) and Enhanced Distributed Channel...
Evolution is making telecom networks to converge towards all-IP communication scenarios where multiple services, including the broadcast of streaming video, are transported by IP packets. A possible solution for supporting multiple video channel transmissions with individual channel access control is by using secure IP multicast. In this paper the authors propose a solution for supporting the b...
One of the areas in which wireless networks based on visible light communication (VLC) is considered superior to traditional radio-based communication is security. The common slogan summarizing VLC security features is WYSIWYS "What You See Is What You Send”. However, especially in the case of infrastructure downlink communication, security must be accounted for also in case of VLC. In this pap...
IEEE 802.11e provides the guaranteed quality of service (QoS) by providing different transmission priorities. IEEE 802.11e improves the media access control layer of IEEE 802.11 to satisfy the different QoS requirements by introducing two channel access functions: the enhanced distributed channel access (EDCA) and HCF controlled channel access (HCCA). Therefore, most devices support different t...
Attribute-based access control (ABAC) and role-based access control (RBAC) are currently the two most popular access control models. Yet, they both have known limitations and offer features complimentary to each other. Due to this fact, integration of RBAC and ABAC has recently emerged as an important area of research. In this paper, we propose an access control model that combines the two mode...
In role-based access control (RBAC) permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. The principal motivation behind RBAC is to simplify administration. An appealing possibility is to use RBAC itself to manage RBAC, to further provide administrative convenience. In this paper we introduce a role-based administrative...
Security of systems and management infrastructure is crucial for a successful, reliable and safe use. Most currently deployed systems are based on simple subject/object-relations where control of access happens. This has the drawback that any access decision occurs just on the behalf of the single subject accessing. In this paper we describe an extended access control model that allows to inclu...
Two security domains that want to exchange information securely may need to agree on translations of Mandatory Access Control (MAC) labels of their information, if their MAC labels have a different syntax or semantics. It is desirable that these translations do not introduce any confidentiality violations. In this paper we present a property, the Security Level Translation Property (SLTP), whic...
In this paper, we show how to model UNIX file access using a rolebased approach. A role-based access control model is presented, and its use in reflecting the existing permissions in a UNIX environment is described.
American and European Legislation for protection of medical data agree that the patient has the right to play a pivotal role in the decisions regarding the content and distribution of her/his medical records. The Role Based Access Control (RBAC) model is the most commonly used authorization model in healthcare. The first goal of this work is to review if existing models and standards provide fo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید