Sciweavers

871 search results - page 22 / 175
» A Decentralized Authorization Architecture
Sort
View
CCS
2008
ACM
14 years 11 months ago
Enforcing authorization policies using transactional memory introspection
Correct enforcement of authorization policies is a difficult task, especially for multi-threaded software. Even in carefully-reviewed code, unauthorized access may be possible in ...
Arnar Birgisson, Mohan Dhawan, Úlfar Erling...
COMPSAC
2003
IEEE
15 years 3 months ago
Scalable Multilateral Communication Technique for Large-Scale Information Systems
Autonomous Community Information System (ACIS) is a proposition made to contend with the extreme dynamism in the large-scale information system. ACIS is a decentralized bilateral-...
Khaled Ragab, Naohiro Kaji, Koichi Moriyama, Kinji...
PAMI
2006
125views more  PAMI 2006»
14 years 9 months ago
The Semantic Pathfinder: Using an Authoring Metaphor for Generic Multimedia Indexing
This paper presents the semantic pathfinder architecture for generic indexing of multimedia archives. The semantic pathfinder extracts semantic concepts from video by exploring dif...
Cees Snoek, Marcel Worring, Jan-Mark Geusebroek, D...
XMLSEC
2003
ACM
15 years 2 months ago
First experiences using XACML for access control in distributed systems
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...
CORR
2008
Springer
136views Education» more  CORR 2008»
14 years 9 months ago
Data Fusion Trees for Detection: Does Architecture Matter?
We consider the problem of decentralized detection in a network consisting of a large number of nodes arranged as a tree of bounded height, under the assumption of conditionally in...
Wee-Peng Tay, John N. Tsitsiklis, Moe Z. Win