Sciweavers

1109 search results - page 140 / 222
» Decentralized access control in distributed file systems
Sort
View
SP
2002
IEEE
200views Security Privacy» more  SP 2002»
15 years 1 months ago
Design of a Role-Based Trust-Management Framework
We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths o...
Ninghui Li, John C. Mitchell, William H. Winsborou...
CHI
2004
ACM
16 years 2 months ago
Orchestrating a mixed reality game 'on the ground'
Successfully staging a mixed reality game in which online players are chased through a virtual city by runners located in the real world requires extensive orchestration work. An ...
Andy Crabtree, Steve Benford, Tom Rodden, Chris Gr...
PDCAT
2005
Springer
15 years 7 months ago
Web Media Service based on Streaming Player supporting ubiquitous environment
This paper examines technique of media access that flexible media service, provided user interaction, and guaranteeing QoS. Currently, there are various streaming services, but th...
Sangok Kim, Kanghee Lee, Zhefan Jiang, Sangwook Ki...
CSREASAM
2009
15 years 3 months ago
Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy
- Until recently the reasons for reduced efficiency and limited implementation of new security systems has been the insufficient performance of hardware that executes access contro...
Vladimir S. Zaborovsky, Anton Titov
HCW
2000
IEEE
15 years 6 months ago
Reliable Cluster Computing with a New Checkpointing RAID-x Architecture
In a serverless cluster of PCs or workstations, the cluster must allow remote file accesses or parallel I/O directly performed over disks distributed to all client nodes. We intro...
Kai Hwang, Hai Jin, Roy S. C. Ho, Wonwoo Ro