Sciweavers

5790 search results - page 356 / 1158
» Distributed programming with distributed authorization
Sort
View
MTA
2002
103views more  MTA 2002»
15 years 3 months ago
STEPS: Supporting Traditional Education Procedures-A TCP/IP Multimedia Networks-Based Model
This paper describes an integrated model for the realization of an Open and Distance Learning (ODL) environment supporting traditional learning procedures, through collaborative le...
Christos Bouras, Petros Lampsas, Paul G. Spirakis
SP
2002
IEEE
200views Security Privacy» more  SP 2002»
15 years 3 months ago
Design of a Role-Based Trust-Management Framework
We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths o...
Ninghui Li, John C. Mitchell, William H. Winsborou...
PET
2012
Springer
13 years 6 months ago
Fault-Tolerant Privacy-Preserving Statistics
Real-time statistics on smart meter consumption data must preserve consumer privacy and tolerate smart meter failures. Existing protocols for this private distributed aggregation m...
Marek Jawurek, Florian Kerschbaum
ISI
2008
Springer
15 years 4 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
ACSD
2009
IEEE
92views Hardware» more  ACSD 2009»
15 years 10 months ago
Desynchronizing Synchronous Programs by Modes
The synchronous programming paradigm simplifies the specification and verification of reactive systems. However, synchronous programs must be often implemented on architectures...
Jens Brandt, Mike Gemunde, Klaus Schneider