Sciweavers

5790 search results - page 2 / 1158
» Distributed programming with distributed authorization
Sort
View
COMPSAC
2000
IEEE
13 years 10 months ago
Practical Key Distribution Schemes for Channel Protection
– This paper presents three key distribution schemes for channel protection. With the proposed schemes, encryption keys of the ordered programs can be distributed to the authoriz...
Yu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyua...
ICPADS
2000
IEEE
13 years 10 months ago
Object-Oriented Real-Time Distributed Programming and Support Middleware
Abstract: The object-oriented (OO) distributed realtime (RT) programming movement started in 1990's and is growing rapidly at this turn of the century. The motivations are rev...
K. H. Kim
ECOOPW
1999
Springer
13 years 10 months ago
The Role of Trust Management in Distributed Systems Security
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
SACMAT
2003
ACM
13 years 11 months ago
On context in authorization policy
Authorization policy infrastructures are evolving with the complex environments that they support. However, the requirements and technologies supporting context are not yet well u...
Patrick Drew McDaniel