Sciweavers

2250 search results - page 113 / 450
» Authorizing applications in singularity
Sort
View
PLDI
2006
ACM
15 years 3 months ago
Specifying distributed trust management in LolliMon
We propose the monadic linear logic programming language LolliMon as a new foundation for the specification of distributed trust management systems, particularly the RT framework...
Jeff Polakow, Christian Skalka
ICDM
2005
IEEE
129views Data Mining» more  ICDM 2005»
15 years 3 months ago
Mining Chains of Relations
Traditional data mining applications consider the problem of mining a single relation between two attributes. For example, in a scientific bibliography database, authors are rela...
Foto N. Afrati, Gautam Das, Aristides Gionis, Heik...
ICDCS
2002
IEEE
15 years 2 months ago
Reasoning about Joint Administration of Access Policies for Coalition Resources
We argue that joint administration of access policies for a dynamic coalition formed by autonomous domains requires that these domains set up a coalition authority that distribute...
Himanshu Khurana, Virgil D. Gligor, John Linn
SACMAT
2010
ACM
15 years 2 months ago
A card requirements language enabling privacy-preserving access control
We address the problem of privacy-preserving access control in distributed systems. Users commonly reveal more personal data than strictly necessary to be granted access to online...
Jan Camenisch, Sebastian Mödersheim, Gregory ...
ECIR
2007
Springer
14 years 11 months ago
Entropy-Based Authorship Search in Large Document Collections
The purpose of authorship search is to identify documents written by a particular author or in a particular style in large document collections. Standard search engines match docum...
Ying Zhao, Justin Zobel