Sciweavers

79 search results - page 11 / 16
» Distributed Authorization Using Delegation with Acyclic Path...
Sort
View
FTDCS
1997
IEEE
15 years 1 months ago
The Saga Security System: A Security Architecture for Open Distributed Systems
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The auth...
Masakazu Soshi, Mamoru Maekawa
CCGRID
2006
IEEE
15 years 3 months ago
A Shibboleth-Protected Privilege Management Infrastructure for e-Science Education
Simplifying access to and usage of large scale compute resources via the Grid is of critical importance to encourage the uptake of e-Research. Security is one aspect that needs to...
J. P. Watt, Oluwafemi Ajayi, Jipu Jiang, Jos Koets...
CORR
2010
Springer
117views Education» more  CORR 2010»
14 years 9 months ago
Node Disjoint Multipath Routing Considering Link and Node Stability protocol: A characteristic Evaluation
Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or ene...
Shuchita Upadhayaya, Charu Gandhi
SOSP
2003
ACM
15 years 6 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
WISEC
2010
ACM
15 years 4 months ago
Timing-based localization of in-band wormhole tunnels in MANETs
The problem of localizing in-band wormhole tunnels in MANETs is considered. In an in-band wormhole attack, colluding attackers use a covert tunnel to create the illusion that two ...
Jinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Th...