Sciweavers

3047 search results - page 339 / 610
» A Secure Distributed Search System
Sort
View
OSDI
2000
ACM
15 years 6 months ago
End-to-End Authorization
Many boundaries impede the flow of authorization information, forcing applications that span those boundaries into hop-by-hop approaches to authorization. We present a unified app...
Jon Howell, David Kotz
USS
2008
15 years 7 months ago
VoteBox: A Tamper-evident, Verifiable Electronic Voting System
Commercial electronic voting systems have experienced many high-profile software, hardware, and usability failures in real elections. While it is tempting to abandon electronic vo...
Daniel Sandler, Kyle Derr, Dan S. Wallach
SACMAT
2003
ACM
15 years 10 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
TR
2011
106views more  TR 2011»
14 years 11 months ago
Exploring Complex Systems Aspects of Blackout Risk and Mitigation
Abstract—Electric power transmission systems are a key infrastructure, and blackouts of these systems have major consequences for the economy and national security. Analyses of b...
David E. Newman, Benjamin A. Carreras, Vickie E. L...
HICSS
2003
IEEE
142views Biometrics» more  HICSS 2003»
15 years 10 months ago
Blackout Mitigation Assessment in Power Transmission Systems
Electric power transmission systems are a key infrastructure and blackouts of these systems have major direct and indirect consequences on the economy and national security. Analy...
Benjamin A. Carreras, Vickie E. Lynch, David E. Ne...