Sciweavers

464 search results - page 2 / 93
» Authorisation Using Attributes from Multiple Authorities
Sort
View
ACSAC
2001
IEEE
13 years 9 months ago
Restricting Access with Certificate Attributes in Multiple Root Environments-A Recipe for Certificate Masquerading
The issue of certificate masquerading against the SSL protocol is pointed out in [4]. In [4], various forms of server certificate masquerading are identified. It should also be no...
James M. Hayes
WETICE
1998
IEEE
13 years 9 months ago
Authorization and Attribute Certificates for Widely Distributed Access Control
We describe a system whose purpose is to explore the use of certificates for the distributed management of access rights for resources that have multiple, independent, and geograp...
William E. Johnston, Srilekha Mudumbai, Mary R. Th...
COLING
2008
13 years 6 months ago
Authorship Attribution and Verification with Many Authors and Limited Data
Most studies in statistical or machine learning based authorship attribution focus on two or a few authors. This leads to an overestimation of the importance of the features extra...
Kim Luyckx, Walter Daelemans
SAC
2005
ACM
13 years 11 months ago
A hierarchical naive Bayes mixture model for name disambiguation in author citations
Because of name variations, an author may have multiple names and multiple authors may share the same name. Such name ambiguity affects the performance of document retrieval, web ...
Hui Han, Wei Xu, Hongyuan Zha, C. Lee Giles
EUROCRYPT
2011
Springer
12 years 8 months ago
Decentralizing Attribute-Based Encryption
We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority and there is no requirement for any global coordination othe...
Allison B. Lewko, Brent Waters