Sciweavers

5790 search results - page 401 / 1158
» Distributed programming with distributed authorization
Sort
View
JCS
2006
118views more  JCS 2006»
15 years 4 months ago
Language based policy analysis in a SPKI Trust Management System
Abstract-- SPKI/SDSI is a standard for issuing authorization and name certificates. SPKI/SDSI can be used to implement a Trust Management System, where the policy for resource acce...
Arun K. Eamani, A. Prasad Sistla
107
Voted
CNSM
2010
15 years 2 months ago
Decomposition techniques for policy refinement
Abstract--The automation of policy refinement, whilst promising great benefits for policy-based management, has hitherto received relatively little treatment in the literature, wit...
Robert Craven, Jorge Lobo, Emil C. Lupu, Alessandr...
SBP
2011
Springer
14 years 11 months ago
Ranking Information in Networks
Given a network, we are interested in ranking sets of nodes that score highest on user-specified criteria. For instance in graphs from bibliographic data (e.g. PubMed), we would l...
Tina Eliassi-Rad, Keith Henderson
GRID
2007
Springer
15 years 8 months ago
Global-scale peer-to-peer file services with DFS
The global inter-networking infrastructure that has become essential for contemporary day-to-day computing and communication tasks, has also enabled the deployment of several large...
Antony Chazapis, Georgios Tsoukalas, Georgios Veri...
ECCC
2011
282views ECommerce» more  ECCC 2011»
14 years 11 months ago
Almost k-wise vs. k-wise independent permutations, and uniformity for general group actions
A family of permutations in Sn is k-wise independent if a uniform permutation chosen from the family maps any distinct k elements to any distinct k elements equally likely. Effici...
Noga Alon, Shachar Lovett