Sciweavers

871 search results - page 2 / 175
» A Decentralized Authorization Architecture
Sort
View
MSS
2000
IEEE
130views Hardware» more  MSS 2000»
13 years 8 months ago
Design for a Decentralized Security System For Network Attached Storage
T This paper describes an architecture for a secure file system based on network-attached storage that guarantees end-to-end encryption for all user data. We describe the design of...
William E. Freeman, Ethan L. Miller
TMC
2010
115views more  TMC 2010»
13 years 2 months ago
Controlled Wi-Fi Sharing in Cities: A Decentralized Approach Relying on Indirect Reciprocity
—In densely populated cities, Wi-Fi networks—private or otherwise—are ubiquitous. We focus on the provision of citywide broadband communication capability to mobile users thr...
Elias C. Efstathiou, Pantelis A. Frangoudis, Georg...
COLCOM
2007
IEEE
13 years 11 months ago
Unraveling decentralized authorization for multi-domain collaborations
Abstract—Current authorization solutions take highly case-bycase approaches. First of all, the solutions address particular types of multi-domain collaborations such as Virtual O...
Hannah K. Lee
CSFW
2007
IEEE
13 years 11 months ago
Design and Semantics of a Decentralized Authorization Language
Moritz Y. Becker, Cédric Fournet, Andrew D....
HASE
2007
IEEE
13 years 11 months ago
Flexible Authorization with Decentralized Access Control Model for Grid Computing
Xinwen Zhang, Qi Li, Jean-Pierre Seifert, Mingwei ...