Sciweavers

639 search results - page 31 / 128
» Delegation in Distributed Systems: Challenges and Open Issue...
Sort
View
EUROSYS
2010
ACM
15 years 4 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
AAMAS
1998
Springer
14 years 11 months ago
A Roadmap of Agent Research and Development
This paper provides an overview of research and development activities in the field of autonomous agents and multi-agent systems. It aims to identify key concepts and applications...
Nicholas R. Jennings, Katia P. Sycara, Michael Woo...
ICMCS
2006
IEEE
82views Multimedia» more  ICMCS 2006»
15 years 5 months ago
PING: a Group-to-Individual Distributed Meeting System
Group-to-individual (G2I) distributed meeting is an important but understudied area. Because of the asymmetry between different parties in G2I meetings, it has two unique challeng...
Yong Rui, Eric Rudolph, Li-wei He, Rico Malvar, Mi...
IPTPS
2004
Springer
15 years 5 months ago
A Practical Distributed Mutual Exclusion Protocol in Dynamic Peer-to-Peer Systems
— Mutual exclusion is one of the well-studied fundamental primitives in distributed systems. However, the emerging P2P systems bring forward several challenges that can’t be co...
Shiding Lin, Qiao Lian, Ming Chen, Zheng Zhang
WISTP
2010
Springer
14 years 9 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel