As distributed applications such as Grid and enterprise systems scale up and become increasingly complex, their authorization infrastructures—based predominantly on the request-...
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Web Services represent an important technology for distributed applications and will replace various other technologies for distributed application development soon. A lot of prob...
We present a decentralized authorization architecture based on capabilities in which parties are able to exercise full control over their resources or delegate it in an ad-hoc man...
Feike W. Dillema, Simone Lupetti, Tage Stabell-Kul...
Recent advances in wireless technology and availability of portable devices with networking capabilities made the increasing hot topic, ubiquitous computing become reality. Also, ...