Sciweavers

1363 search results - page 16 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
HPDC
2007
IEEE
15 years 5 months ago
Cooperative secondary authorization recycling
As distributed applications such as Grid and enterprise systems scale up and become increasingly complex, their authorization infrastructures—based predominantly on the request-...
Qiang Wei, Matei Ripeanu, Konstantin Beznosov
IASTEDSE
2004
15 years 3 days ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
ICWS
2004
IEEE
15 years 3 days ago
Web Service Authorization Framework
Web Services represent an important technology for distributed applications and will replace various other technologies for distributed application development soon. A lot of prob...
Thomas Ziebermayr, Stefan Probst
AINA
2007
IEEE
15 years 5 months ago
A Decentralized Authorization Architecture
We present a decentralized authorization architecture based on capabilities in which parties are able to exercise full control over their resources or delegate it in an ad-hoc man...
Feike W. Dillema, Simone Lupetti, Tage Stabell-Kul...
PDCAT
2005
Springer
15 years 4 months ago
Collaborative MPEG-4 Contents Authoring, Presentation and Interaction in a Mobile Environment
Recent advances in wireless technology and availability of portable devices with networking capabilities made the increasing hot topic, ubiquitous computing become reality. Also, ...
SongLu Li, Sangwook Kim, Sunkyung Kim