Sciweavers

5816 search results - page 21 / 1164
» Distributed Management by Delegation
Sort
View
ESORICS
2006
Springer
15 years 5 months ago
Reducing the Dependence of SPKI/SDSI on PKI
Abstract. Trust-management systems address the authorization problem in distributed systems. They offer several advantages over other approaches, such as support for delegation and...
Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwo...
SRDS
2003
IEEE
15 years 7 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
ENTCS
2008
130views more  ENTCS 2008»
15 years 2 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
IM
1997
15 years 3 months ago
Active Objects in TMN
Telecommunications Management Network (TMN) systems use the object-oriented information modelling techniques and communication facilities provided by OSI Systems Management (SM). ...
Anastasia Vassila, George Pavlou, Graham Knight
GCC
2004
Springer
15 years 7 months ago
A Novel VO-Based Access Control Model for Grid
As an important aspect of grid security, access control model gets more and more attention. Entities in virtual organizations (VOs) must establish a dynamic, secure and cooperative...
Weizhong Qiang, Hai Jin, Xuanhua Shi, Deqing Zou