Sciweavers

517 search results - page 43 / 104
» Distributed Authentication in GRID5000
Sort
View
CCS
1994
ACM
15 years 1 months ago
Endorsements, Licensing, and Insurance for Distributed System Services
Clients in a distributedsystem place their con dencein many servers, and servers themselves rely on other servers for le storage, authentication, authorization, and payment. When ...
Gennady Medvinsky, Charlie Lai, B. Clifford Neuman
ISTA
2001
14 years 11 months ago
Methodology of distributed technological complex system simulation
: The simulation of technological process in the oil pipelines system is considered in the paper. The solution of the task meets a number of difficulties originating during control...
Oye Fedorovich, A. V. Prohorov, Thomas Ramirez
JCS
2007
103views more  JCS 2007»
14 years 9 months ago
Risk management for distributed authorization
Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all asse...
Christian Skalka, Xiaoyang Sean Wang, Peter C. Cha...
ICIP
1998
IEEE
15 years 11 months ago
A Web-based Secure System for the Distributed Printing of Documents and Images
We propose and consider a secure printing system for the distributed printing of documents and images over the World Wide Web. This system enables secure sharing, commerce, and co...
Ping Wah Wong, Daniel Tretter, Thomas Kite, Qian L...
PERCOM
2007
ACM
15 years 9 months ago
Distributed, Uncertainty-Aware Access Control for Pervasive Computing
Access control to sensitive resources in pervasive computing needs to take uncertainty into account. Previous research has developed uncertainty-aware access-control models for en...
Urs Hengartner, Ge Zhong