Sciweavers

5816 search results - page 12 / 1164
» Distributed Management by Delegation
Sort
View
SIGCOMM
2009
ACM
15 years 8 months ago
Delegating network security with more information
Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and ...
Jad Naous, Ryan Stutsman, David Mazières, N...
USENIX
2003
15 years 3 months ago
Secure and Flexible Global File Sharing
Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...
LISA
2008
15 years 4 months ago
Authorisation and Delegation in the Machination Configuration System
Experience with a crudely delegated user interface to our internally developed configuration management system convinced us that delegated access to configuration systems was wort...
Colin Higgs
ICSOC
2004
Springer
15 years 7 months ago
Automated composition of e-services: lookaheads
The e-services paradigm promises to enable rich, flexible, and dynamic inter-operation of highly distributed, heterogeneous networkenabled services. Among the challenges, a funda...
Cagdas Evren Gerede, Richard Hull, Oscar H. Ibarra...
125
Voted
NOMS
2000
IEEE
176views Communications» more  NOMS 2000»
15 years 6 months ago
Design and analysis of a proactive application management system (PAMS)
Management of large-scale Network-Centric Systems (NCS) and their applications is an extremely complex and challenging task due to factors such as centralized management architect...
Salim Hariri, Yoonhee Kim