Sciweavers

871 search results - page 61 / 175
» A Decentralized Authorization Architecture
Sort
View
MM
1997
ACM
104views Multimedia» more  MM 1997»
15 years 2 months ago
A Framework for Generating Adaptable Hypermedia Documents
Being able to author a hypermedia document once for presentation under a wide variety of potential circumstances requires that it be stored in a manner that is adaptable to these ...
Lloyd Rutledge, Jacco van Ossenbruggen, Lynda Hard...
CMS
2003
108views Communications» more  CMS 2003»
14 years 11 months ago
Towards an IPv6-Based Security Framework for Distributed Storage Resources
Abstract. Some security problems can be often solved through authorization rather than authentication. Furthermore, certificate-based authorization approach can alleviate usual dr...
Alessandro Bassi, Julien Laganier
CHI
2005
ACM
15 years 10 months ago
Giving the caller the finger: collaborative responsibility for cellphone interruptions
We present a system in which a cell phone decides whether to ring by accepting votes from the others in a conversation with the called party. When a call comes in, the phone first...
Stefan Marti, Chris Schmandt
ICDCN
2010
Springer
15 years 4 months ago
Poisoning the Kad Network
Abstract. Since the demise of the Overnet network, the Kad network has become not only the most popular but also the only widely used peer-to-peer system based on a distributed has...
Thomas Locher, David Mysicka, Stefan Schmid, Roger...
CSFW
2008
IEEE
15 years 4 months ago
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages
Early work on security-typed languages required that legal information flows be defined statically. More recently, techniques have been introduced that relax these assumptions a...
Sruthi Bandhakavi, William H. Winsborough, Mariann...