Computer Networks and Their Applications
Browse by
Computer Networks and Their Applications
Recent Submissions
-
Dynamic User-Oriented Role Based Access Control Model (DUO-RBAC)
(EDA, 2018-10)Most researchers use role mining to generate role-based access con- trol model from the existing user-permission assignments. User-oriented role- based access control model is a type of role-based access control model, ... -
Discovery and Group Communication for Constrained Internet of Things Devices using the Constrained Application Protocol
(Ghent University, 2015)The ubiquitous Internet is rapidly spreading to new domains. This expansion of the Internet is comparable in scale to the spread of the Internet in the ’90s. The resulting Internet is now commonly referred to as the ...