Sciweavers

143 search results - page 14 / 29
» A Formalization of Distributed Authorization with Delegation
Sort
View
75
Voted
DEDS
2008
48views more  DEDS 2008»
15 years 13 days ago
On the Minimization of Communication in Networked Systems with a Central Station
The problem of minimizing communication in a distributed networked system is considered in a discrete-event formalism where the system is modeled as a finite-state automaton. The s...
Weilin Wang, Stéphane Lafortune, Feng Lin
DASFAA
2009
IEEE
252views Database» more  DASFAA 2009»
15 years 7 months ago
Optimal Privacy-Aware Path in Hippocratic Databases
Abstract. Privacy becomes a major concern for both customers and enterprises in today’s corporate marketing strategies, many research efforts have been put into developing new p...
Min Li, Xiaoxun Sun, Hua Wang, Yanchun Zhang
SRDS
2003
IEEE
15 years 5 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
81
Voted
COMPUTER
2004
120views more  COMPUTER 2004»
15 years 6 days ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
EGC
2005
Springer
15 years 5 months ago
Mobile-to-Grid Middleware: Bridging the Gap Between Mobile and Grid Environments
Currently, access to Grid services is limited to resourceful devices such as desktop PCs but most mobile devices (with wireless network connections) cannot access the Grid network ...
Hassan Jameel, Umar Kalim, Ali Sajjad, Sungyoung L...