Sciweavers

124 search results - page 7 / 25
» Adaptive Secure Access to Remote Services
Sort
View
83
Voted
PERCOM
2007
ACM
15 years 9 months ago
Middleware for Secure Home Access and Control
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Andrés Marín López, Wolfgang ...
CONCURRENCY
2002
112views more  CONCURRENCY 2002»
14 years 9 months ago
The Virtual Service Grid: an architecture for delivering high-end network services
This paper presents the design of a novel system architecture, Virtual Service Grid (VSG), for delivering high performance network services. The VSG is based on the concept of the...
Jon B. Weissman, Byoung-Dai Lee
CSREASAM
2006
14 years 10 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
WETICE
1998
IEEE
15 years 1 months ago
Using SESAME's GSS-API to add Security to Unix Applications
SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an ext...
Paul Ashley, Mark Vandenwauver, Mark Rutherford, S...
81
Voted
GRID
2005
Springer
15 years 2 months ago
Adaptive trust negotiation and access control for grids
— Access control in computational grids is typically provided by a combination of identity certificates and local accounts. This approach does not scale as the number of users a...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Noria...