Sciweavers

5790 search results - page 25 / 1158
» Distributed programming with distributed authorization
Sort
View
64
Voted
ICALT
2009
IEEE
15 years 8 months ago
Mediating Distribution Models and Access Control for the Exchange of Learning Objects
This paper presents a learning object broker that aims to mediate and control accesses to learning objects offered by the “Learning Resource Exchange”. This broker provides a u...
Jean-Noel Colin, Tien-Dung Le, David Massart
CMS
2003
108views Communications» more  CMS 2003»
15 years 3 months ago
Towards an IPv6-Based Security Framework for Distributed Storage Resources
Abstract. Some security problems can be often solved through authorization rather than authentication. Furthermore, certificate-based authorization approach can alleviate usual dr...
Alessandro Bassi, Julien Laganier
COLT
1994
Springer
15 years 6 months ago
Bayesian Inductive Logic Programming
Inductive Logic Programming (ILP) involves the construction of first-order definite clause theories from examples and background knowledge. Unlike both traditional Machine Learnin...
Stephen Muggleton
HPDC
2007
IEEE
15 years 8 months ago
Cooperative secondary authorization recycling
As distributed applications such as Grid and enterprise systems scale up and become increasingly complex, their authorization infrastructures—based predominantly on the request-...
Qiang Wei, Matei Ripeanu, Konstantin Beznosov
128
Voted
IASTEDSE
2004
15 years 3 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis