Sciweavers

3638 search results - page 143 / 728
» Distribution chain security
Sort
View
120
Voted
AGENTS
1997
Springer
15 years 8 months ago
Distributed Diagnosis by Vivid Agents
Many systems, such as large manufacturing systems, telecommunication networks, or homeautomation systems, require distributed monitoring and diagnosis. In this article, we introdu...
Michael Schroeder, Gerd Wagner
141
Voted
ESORICS
2007
Springer
15 years 10 months ago
A Policy Language for Distributed Usage Control
We present the Obligation Specification Language (OSL), a policy language for distributed usage control. OSL supports the formalization of a wide range of usage control requiremen...
Manuel Hilty, Alexander Pretschner, David A. Basin...
CSFW
2005
IEEE
15 years 9 months ago
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols
Authentication and secrecy properties are proved by very different methods: the former by local reasoning, leading to matching knowledge of all principals about the order of their...
Iliano Cervesato, Catherine Meadows, Dusko Pavlovi...
140
Voted
WORDS
2002
IEEE
15 years 8 months ago
Role-Based Access Control for CORBA Distributed Object Systems
This paper shows how role-based access control (RBAC) models can be implemented in distributed object-based systems that follow OMG/CORBA standards. We introduce a novel approach ...
Rafael R. Obelheiro, Joni da Silva Fraga
TLDI
2010
ACM
190views Formal Methods» more  TLDI 2010»
16 years 22 days ago
Distributed programming with distributed authorization
We propose a programming language, called PCML5, for building distributed applications with distributed access control. Target applications include web-based systems in which prog...
Kumar Avijit, Anupam Datta, Robert Harper