Sciweavers

871 search results - page 73 / 175
» A Decentralized Authorization Architecture
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Layering Public Key Distribution Over Secure DNS using Authenticated Delegation
We present the Internet Key Service (IKS), a distributed architecture for authenticated distribution of public keys, layered on Secure DNS (DNSSEC). Clients use DNSSEC to securely...
John P. Jones, Daniel F. Berger, Chinya V. Ravisha...
MIS
2005
Springer
158views Multimedia» more  MIS 2005»
15 years 3 months ago
Context-Based Management of Multimedia Documents in 3D Navigational Environments
Abstract. This work proposes an approach for managing multimedia information associated to 3D environments navigated by the user. The influence of context (location, user profile, ...
Fabio Pittarello
MAS
1998
Springer
153views Communications» more  MAS 1998»
15 years 2 months ago
Authentication for Mobile Agents
In mobile agent systems, program code together with some process state can autonomously migrate to new hosts. Despite its many practical benefits, mobile agent technology results i...
Shimshon Berkovits, Joshua D. Guttman, Vipin Swaru...
CISIS
2010
IEEE
15 years 4 months ago
Computational Grid as an Appropriate Infrastructure for Ultra Large Scale Software Intensive Systems
—Ultra large scale (ULS) systems are future software intensive systems that have billions of lines of code, composed of heterogeneous, changing, inconsistent and independent elem...
Babak Rezaei Rad, Fereidoon Shams Aliee
ESAW
2009
Springer
15 years 4 months ago
A Space-Based Generic Pattern for Self-Initiative Load Balancing Agents
Abstract. Load-Balancing is a significant problem in heterogeneous distributed systems. There exist many load balancing algorithms, however, most approaches are very problem speci...
eva Kühn, Vesna Sesum-Cavic