Sciweavers

704 search results - page 28 / 141
» Building Distributed Access Control System Using Service-Ori...
Sort
View
INFOCOM
2008
IEEE
15 years 8 months ago
A Scalable Method for Access Control in Location-Based Broadcast Services
Abstract. One important problem for such public broadcast LBS is to enforce access control on a large number of subscribers. In such a system a user typically subscribes to a LBS f...
Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Li...
122
Voted
SACMAT
2009
ACM
15 years 8 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
117
Voted
CCS
2009
ACM
16 years 2 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
KESAMSTA
2010
Springer
15 years 4 months ago
Modelling Dynamic Forgetting in Distributed Information Systems
Abstract. We describe and model a new aspect in the design of distributed information systems. We build upon a previously described problem on the microlevel, which asks how quickl...
Nicolas Höning, Martijn C. Schut
HPDC
1999
IEEE
15 years 6 months ago
A Resource Description Environment for Distributed Computing Systems
RSD (Resource and Service Description) is a software architecture for specifying, registering and accessing resources and services in complex heterogeneous computing environments....
Matthias Brune, Alexander Reinefeld, Jörg Var...