Sciweavers

5790 search results - page 305 / 1158
» Distributed programming with distributed authorization
Sort
View
114
Voted
USENIX
2003
15 years 5 months ago
Secure and Flexible Global File Sharing
Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...
BIRTHDAY
2010
Springer
15 years 4 months ago
DKAL and Z3: A Logic Embedding Experiment
Yuri Gurevich and Itay Neeman proposed the Distributed Knowledge Authorization Language, DKAL, as an expressive, yet very succinctly expressible logic for distributed authorization...
Sergio Mera, Nikolaj Bjørner
132
Voted
JAIR
2007
151views more  JAIR 2007»
15 years 3 months ago
Topic and Role Discovery in Social Networks with Experiments on Enron and Academic Email
Previous work in social network analysis (SNA) has modeled the existence of links from one entity to another, but not the attributes such as language content or topics on those li...
Andrew McCallum, Xuerui Wang, Andrés Corrad...
135
Voted
PRDC
2002
IEEE
15 years 8 months ago
Reliability Analysis of Grid Computing Systems
Grid computing system is different from conventional distributed computing systems by its focus on large-scale resource sharing, where processors and communication have significan...
Y. S. Dai, Min Xie, Kim-Leng Poh
101
Voted
ICALP
2000
Springer
15 years 7 months ago
A Matrix-based Method for Analysing Stochastic Process Algebras
This paper demonstrates how three stochastic process algebras can be mapped on to a generally-distributed stochastic transition system. We demonstrate an aggregation technique on ...
Jeremy T. Bradley, N. J. Davies