Sciweavers

1363 search results - page 93 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
128
Voted
SP
2002
IEEE
200views Security Privacy» more  SP 2002»
15 years 3 months ago
Design of a Role-Based Trust-Management Framework
We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths o...
Ninghui Li, John C. Mitchell, William H. Winsborou...
PET
2012
Springer
13 years 5 months ago
Fault-Tolerant Privacy-Preserving Statistics
Real-time statistics on smart meter consumption data must preserve consumer privacy and tolerate smart meter failures. Existing protocols for this private distributed aggregation m...
Marek Jawurek, Florian Kerschbaum
130
Voted
COLCOM
2007
IEEE
15 years 9 months ago
SemCW: Semantic collaborative writing using RST
—During collaborative writing each author works on a copy of the shared document. These copies are then merged to produce the final document. This asynchronous work is supported...
Charbel Rahhal, Hala Skaf-Molli, Pascal Molli, Nis...
159
Voted
PPPJ
2004
ACM
15 years 8 months ago
Embedding JAAS in agent roles to apply local security policies
Agents are an emerging technology that grants programmers a new way to exploit distributed resources. Roles are a powerful concept that can be used to model agent interactions, all...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi
SIGECOM
2010
ACM
219views ECommerce» more  SIGECOM 2010»
15 years 8 months ago
Revenue maximization with a single sample
We design and analyze approximately revenue-maximizing auctions in general single-parameter settings. Bidders have publicly observable attributes, and we assume that the valuation...
Peerapong Dhangwatnotai, Tim Roughgarden, Qiqi Yan