Sciweavers

1363 search results - page 90 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
COLCOM
2007
IEEE
15 years 9 months ago
Towards trust-aware access management for ad-hoc collaborations
—In an ad-hoc collaborative sharing environment, attribute-based access control provides a promising approach in defining authorization over shared resources based on users’ p...
Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin H...
CCS
2007
ACM
15 years 9 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
LCN
2006
IEEE
15 years 9 months ago
The Internet Group Management Protocol with Access Control (IGMP-AC)
IP Multicast is best known for its bandwidth conservation and lower resource utilization. The classical model of multicast makes it difficult to permit access only to authorized ...
Salekul Islam, J. William Atwood
SACMAT
2010
ACM
15 years 8 months ago
A card requirements language enabling privacy-preserving access control
We address the problem of privacy-preserving access control in distributed systems. Users commonly reveal more personal data than strictly necessary to be granted access to online...
Jan Camenisch, Sebastian Mödersheim, Gregory ...
121
Voted
ADCM
2000
57views more  ADCM 2000»
15 years 3 months ago
Polynomial frames on the sphere
We introduce a class of polynomial frames suitable for analyzing data on the surface of the unit sphere of a Euclidean space. Our frames consist of polynomials, but are well local...
Hrushikesh Narhar Mhaskar, Francis J. Narcowich, J...