Sciweavers

40 search results - page 3 / 8
» Proxy-Based Authorization and Accounting for Distributed Sys...
Sort
View
ESCIENCE
2006
IEEE
13 years 9 months ago
Authorizing Remote Job Execution Based on Job Properties
: E-Science often requires access to remote Grid computing platforms. Current authorization systems on these remote systems have largely based decisions solely on the identity of t...
Sang-Min Park, Glenn S. Wasson, Marty Humphrey
IPPS
2009
IEEE
14 years 12 days ago
Performance prediction for running workflows under role-based authorization mechanisms
When investigating the performance of running scientific/ commercial workflows in parallel and distributed systems, we often take into account only the resources allocated to the ...
Ligang He, Mark Calleja, Mark Hayes, Stephen A. Ja...
ICTAI
2009
IEEE
14 years 12 days ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
IEEEARES
2008
IEEE
14 years 5 days ago
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks
— Access control concerns in MANETs are very serious and considered as a crucial challenge for operators who prospects to employ unrivaled capabilities of such networks for diffe...
Amir R. Khakpour, Maryline Laurent-Maknavicius, Ha...
COMPSAC
2010
IEEE
13 years 3 months ago
A Consistency Model for Identity Information in Distributed Systems
In distributed IT systems, replication of information is commonly used to strengthen the fault tolerance on a technical level or the autonomy of an organization on a business level...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...