Sciweavers

1134 search results - page 58 / 227
» Distributed Proving in Access-Control Systems
Sort
View
IWRT
2010
178views Communications» more  IWRT 2010»
15 years 1 months ago
CSMA Multi-stage Anti-collision Protocol for Active RFID Systems
Current anti-collision protocols for active RFID systems stem from the ISO-18000-7 standard, which selects Frame Slotted Aloha as the underlying Medium Access Control protocol. How...
Alejandro Palomo-López, M. Victoria Bueno-D...
SACMAT
2010
ACM
15 years 1 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
122
Voted
ATAL
2008
Springer
15 years 5 months ago
Synchronization protocols for reliable communication in fully distributed agent systems
In order to prevent misunderstandings within groups of interacting agents, it is necessary to ensure that the agents' beliefs regarding the overall state of the interaction a...
Hywel R. Dunn-Davies, Jim Cunningham, Shamimabi Pa...
HPDC
1998
IEEE
15 years 7 months ago
Authorization for Metacomputing Applications
One of the most difficult problems to be solved by metacomputing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved ...
G. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman
MOBIQUITOUS
2008
IEEE
15 years 9 months ago
ScreenSpot: multidimensional resource discovery for distributed applications in smart spaces
The big challenge related to the contemporary research on ubiquitous and pervasive computing is that of seamless integration. For the next generation of ubiquitous and distributed...
Marko Jurmu, Sebastian Boring, Jukka Riekki