Sciweavers

170 search results - page 2 / 34
» Maille authorization - a distributed, redundant authorizatio...
Sort
View
OSDI
2000
ACM
13 years 6 months ago
End-to-End Authorization
Many boundaries impede the flow of authorization information, forcing applications that span those boundaries into hop-by-hop approaches to authorization. We present a unified app...
Jon Howell, David Kotz
ECAL
2003
Springer
13 years 10 months ago
Building a Hybrid Society of Mind Using Components from Ten Different Authors
Building large complex minds is difficult because we do not understand what the necessary components are or how they should interact. Even if the components were known it is diffic...
Ciarán O'Leary, Mark Humphrys
ACSAC
2008
IEEE
13 years 11 months ago
Please Permit Me: Stateless Delegated Authorization in Mashups
Mashups have emerged as a Web 2.0 phenomenon, connecting disjoint applications together to provide unified services. However, scalable access control for mashups is difficult. T...
Ragib Hasan, Marianne Winslett, Richard M. Conlan,...
CMS
2003
108views Communications» more  CMS 2003»
13 years 6 months ago
Towards an IPv6-Based Security Framework for Distributed Storage Resources
Abstract. Some security problems can be often solved through authorization rather than authentication. Furthermore, certificate-based authorization approach can alleviate usual dr...
Alessandro Bassi, Julien Laganier
CCS
2007
ACM
13 years 11 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor