Sciweavers

2061 search results - page 45 / 413
» Authorization for Metacomputing Applications
Sort
View
ICDCS
2003
IEEE
15 years 5 months ago
Integrated Access Control and Intrusion Detection for Web Servers
Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between thes...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, L...
212
Voted
HUC
2011
Springer
14 years 3 days ago
How smart is your smartcard?: measuring travel behaviours, perceptions, and incentives
The widespread adoption of automated fare collection (AFC) systems by public transport authorities around the world means that, increasingly, people carry and use passive sensors ...
Neal Lathia, Licia Capra
87
Voted
CCS
2010
ACM
15 years 7 months ago
Attribute-based signature and its applications
In an attribute-based signature (ABS), users sign messages with any predicate of their attributes issued from an attribute authority. Under this notion, a signature attests not to...
Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui...
GRID
2006
Springer
15 years 14 days ago
Using Workflow for Dynamic Security Context Management in Grid-based Applications
This paper presents ongoing research and current results on the development of flexible access control infrastructures for complex resource provisioning in Grid-based collaborativ...
Yuri Demchenko, Leon Gommans, Cees de Laat, Arie T...
CONCUR
2005
Springer
15 years 6 months ago
A Practical Application of Geometric Semantics to Static Analysis of Concurrent Programs
Abstract. In this paper we show how to compress efficiently the statespace of a concurrent system (here applied to a simple shared memory model, but this is no way limited to that ...
Eric Goubault, Emmanuel Haucourt