Sciweavers

1363 search results - page 35 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
ICNP
2003
IEEE
15 years 4 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
SACMAT
2006
ACM
15 years 5 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
ICPP
2005
IEEE
15 years 4 months ago
Distributed Access Control in CROWN Groups
Security in collaborative groups is an active research topic and has been recognized by many organizations in the past few years. In this paper, we propose a fine-grained and attr...
Jinpeng Huai, Yu Zhang, Xianxian Li, Yunhao Liu
ATAL
2003
Springer
15 years 4 months ago
Authoring scenes for adaptive, interactive performances
In this paper, we introduce a toolkit called SceneMaker for authoring scenes for adaptive, interactive performances. These performances are based on automatically generated and pr...
Patrick Gebhard, Michael Kipp, Martin Klesen, Thom...
COLING
2008
15 years 13 days ago
Weakly Supervised Supertagging with Grammar-Informed Initialization
Much previous work has investigated weak supervision with HMMs and tag dictionaries for part-of-speech tagging, but there have been no similar investigations for the harder proble...
Jason Baldridge