نتایج جستجو برای: media access control

تعداد نتایج: 1852182  

2005
Ray-Guang Cheng Shiao-Li Tsao

The integration of WLANs and 3G networks has recently attracted much attention. To support seamless service between 3G and WLAN networks, low latency access control mechanisms of the two networks are highly required. This work presents a novel access control mechanism, which aims to support seamless services for an integrated 3G-WLAN network. The proposed method, based on a loose coupling archi...

2014
Asad Ali Maribel Fernández

Access control policies often are partly static, i.e. no dependence on any run-time information, and partly dynamic. However, they are usually enforced dynamically even the static parts. We propose a new hybrid approach to policy enforcement in the Category-Based Access Control (CBAC) meta-model. We build on previous work, which established a static system for the enforcement of (static) hierar...

2003
Indrakshi Ray Na Li Dae-Kyoo Kim Robert B. France

Abstract: Situations can arise in which organizations have to merge policies that are based on different access control frameworks, such as Role Based Access Control (RBAC) and Mandatory Access Control (MAC). Integrating policies requires addressing the following question: How will the integration impact access to protected resources? In particular, one needs to determine that the integration d...

2007
Frédéric Cuppens Céline Coma

There has been for several years a growing interest in defining new access control models and administration facilities for these models. Several models have observed that only structuring the model using the concept of roles as in RBAC is not sufficient to administer decentralized enterprises. These models have suggested to consider new concepts such as organization (as in OrBAC) or domain (as...

2003
Frédéric Cuppens Alexandre Miège

Even though the final objective of an access control model is to provide a framework to decide if actions performed by subjects on objects are permitted or not, it is not convenient to directly specify an access control policy using concepts of subjects, objects and actions. This is why the Role Based Access Control (RBAC) model suggests using a more abstract concept than subject to specify a p...

2003
Charles E. Phillips Steven A. Demurjian T. C. Ting

Our role-based/mandatory access control (RBAC/MAC) security model and enforcement framework for inter-operating legacy, COTS, GOTS, databases, servers, etc., limits: who (user/user role) can invoke which methods (based on value and MAC level) of artifact APIs at what times, and who (user) can delegate which responsibility (user role) at what times. In this chapter, we focus on assurance for the...

Journal: :I. J. Network Security 2007
Cungang Yang

In the secure domain computing environments, it is important to keep resources and information integrity from unauthorized access. Therefore, there is a strong demand on the access control for shared resources. In the past few years, Role-based Access Control (RBAC) has been introduced and offered a powerful means of specifying access control decisions. In this paper, an Object Oriented RBAC mo...

1998
Victoria Ungureanu Naftaly H. Minsky

Modern distributed systems tend to be conglomerates of heterogeneous subsystems, which have been designed separately, by di erent people, with little, if any, knowledge of each other | and which may be governed by di erent security policies. A single software agent operating within such a system may nd itself interacting with, or even belonging to, several subsystems, and thus be subject to sev...

1996
Randa El-Marakby David Hutchison

In this paper, we outline an architecture and an implementation which enables the real-time delivery of continuous media within the WWW, monitors QoS of data transmission, and conveys minimal session control information to all participants in an audio or a video session. We describe our current implementation of the Real-time Transport Protocol (RTP) and its associated control protocol RTCP emb...

2014
David C. Wyld Craig M. Gelowitz Luigi Benedicenti Raman Paranjape

This paper presents a distributed software mobile agent framework for media access. The access and delivery of media is enhanced by an agent architecture framework that utilizesmobile agent characteristics to provide access and delivery of media. Migrating agents to the media source and destination devices enables the framework to discover the properties of devices and media within networks dyn...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید