Sciweavers

5816 search results - page 32 / 1164
» Distributed Management by Delegation
Sort
View
ICISC
2003
89views Cryptology» more  ICISC 2003»
15 years 6 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
CIA
2008
Springer
15 years 7 months ago
Incrementally Refined Acquaintance Model for Consortia Composition
This paper presents a specific contracting algorithm that contributes to the process of distributed planning and resource allocation in competitive, semi-trusted environments. The ...
Jan Doubek, Jirí Vokrínek, Michal Pe...
ISW
2004
Springer
15 years 10 months ago
A Distributed High Assurance Reference Monitor
Abstract Ajay Chander1 , Drew Dean2 , and John Mitchell3 1 DoCoMo Communications Laboratories USA, San Jose, CA 95110 2 Computer Science Laboratory, SRI International, Menlo Park, ...
Ajay Chander, Drew Dean, John C. Mitchell
DBSEC
2009
110views Database» more  DBSEC 2009»
15 years 6 months ago
Distributed Privilege Enforcement in PACS
Abstract. We present a new access control mechanism for P2P networks with distributed enforcement, called P2P Access Control System (PACS). PACS enforces powerful access control mo...
Christoph Sturm, Ela Hunt, Marc H. Scholl
DSRT
2004
IEEE
15 years 9 months ago
FreeMMG: A Scalable and Cheat-Resistant Distribution Model for Internet Games
State-of-the-art Massively Multiplayer Games such as EverQuest and Ultima Online are currently implemented as client-server systems. Although this approach allows the development ...
Fábio Reis Cecin, Rodrigo Araújo Rea...