Sciweavers

871 search results - page 37 / 175
» A Decentralized Authorization Architecture
Sort
View
AAAI
2004
14 years 11 months ago
Affective Recruitment of Distributed Heterogeneous Agents
Members of multi-robot teams may need to collaborate to accomplish a task due to differences in capabilities. This paper describes an extension of the ALLIANCE architecture that e...
Aaron Gage, Robin R. Murphy
ECOWS
2010
Springer
14 years 7 months ago
Shepherd: node monitors for fault-tolerant distributed process execution in OSIRIS
OSIRIS is a middleware for the composition and orchestration of distributed web services that follows a P2P decentralized approach to process execution, providing already some deg...
Diego Milano, Nenad Stojnic
EURONGI
2004
Springer
15 years 3 months ago
Enabling Mobile Peer-to-Peer Networking
Abstract. In this paper we present a P2P file-sharing architecture optimized for mobile networks. We discuss the applicability of current P2P techniques for resource access and me...
Jens O. Oberender, Frank-Uwe Andersen, Hermann de ...
CCS
2007
ACM
15 years 3 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
ACSAC
1999
IEEE
15 years 2 months ago
Security Architecture Development and Results for a Distributed Modeling and Simulation System
This paper reports on an ongoing effort to define the security architecture for the Joint Simulation System (JSIMS), a joint military modeling and simulation system. It also descr...
Richard B. Neely