Sciweavers

5790 search results - page 388 / 1158
» Distributed programming with distributed authorization
Sort
View
PDCAT
2005
Springer
15 years 9 months ago
Access Control List Mediation System for Large-Scale Network
Large-Scale network such as the Internet consist of a large number of sub-networks. Since each subnetwork has management privileges and policies individually, it is difficult to r...
Kanghee Lee, Zhefan Jiang, Sangok Kim, Sangwook Ki...
ICDCSW
2003
IEEE
15 years 9 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
COLCOM
2009
IEEE
15 years 9 months ago
Information retrieval on mind maps - what could it be good for?
—Mind maps are used by millions of people. In this paper we present how information retrieval on mind maps could be used to enhance expert search, document summarization, keyword...
Jöran Beel, Bela Gipp, Jan-Olaf Stiller
FTDCS
1999
IEEE
15 years 8 months ago
Lessons Learned from Building a Web-Based Spatial Data Discovery Facility
This paper discusses the lessons learned and decisions made while designing and developing a web-based application for the National Spatial Information Framework (NSIF) of South A...
Ferdie Danzfuss, Judith Bishop
ICPADS
1994
IEEE
15 years 8 months ago
Delayed Precise Invalidation - A Software Cache Coherence Scheme
: Software cache coherence schemes are very desirable in the design of scalable multiprocessors and massively parallel processors. The authors propose a software cache coherence sc...
T.-S. Hwang, C.-P. Chung