Sciweavers

143 search results - page 18 / 29
» A Formalization of Distributed Authorization with Delegation
Sort
View
INFOCOM
2010
IEEE
15 years 9 days ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
115
Voted
JCS
2006
118views more  JCS 2006»
15 years 1 months ago
Language based policy analysis in a SPKI Trust Management System
Abstract-- SPKI/SDSI is a standard for issuing authorization and name certificates. SPKI/SDSI can be used to implement a Trust Management System, where the policy for resource acce...
Arun K. Eamani, A. Prasad Sistla
CNSM
2010
14 years 12 months ago
Decomposition techniques for policy refinement
Abstract--The automation of policy refinement, whilst promising great benefits for policy-based management, has hitherto received relatively little treatment in the literature, wit...
Robert Craven, Jorge Lobo, Emil C. Lupu, Alessandr...
119
Voted
APN
2006
Springer
15 years 5 months ago
A New Approach to the Evaluation of Non Markovian Stochastic Petri Nets
Abstract. In this work, we address the problem of transient and steadystate analysis of a stochastic Petri net which includes non Markovian distributions with a finite support but ...
Serge Haddad, Lynda Mokdad, Patrice Moreaux
139
Voted
ATAL
2009
Springer
15 years 8 months ago
Boolean combinations of weighted voting games
Weighted voting games are a natural and practically important class of simple coalitional games, in which each agent is assigned a numeric weight, and a coalition is deemed to be ...
Piotr Faliszewski, Edith Elkind, Michael Wooldridg...