Sciweavers

2655 search results - page 47 / 531
» Event Systems and Access Control
Sort
View
TPDS
1998
94views more  TPDS 1998»
15 years 3 months ago
Access Control and Signatures via Quorum Secret Sharing
—We suggest a method of controlling the access to a secure database via quorum systems. A quorum system is a collection of sets (quorums) every two of which have a nonempty inter...
Moni Naor, Avishai Wool
ITCC
2005
IEEE
15 years 9 months ago
An Aspect-Oriented Approach to Mobile Agent Access Control
This paper presents an aspect-oriented approach to access control in mobile agent systems, where a multipoint security check mechanism visualizes the services of a host as individ...
Dianxiang Xu, Vivek Goel
HASE
2007
IEEE
15 years 10 months ago
Flexible Authorization with Decentralized Access Control Model for Grid Computing
Xinwen Zhang, Qi Li, Jean-Pierre Seifert, Mingwei ...
SACMAT
2004
ACM
15 years 9 months ago
Using uml to visualize role-based access control constraints
Indrakshi Ray, Na Li, Robert B. France, Dae-Kyoo K...
SACMAT
2009
ACM
15 years 10 months ago
A decision support system for secure information sharing
In both the commercial and defense sectors a compelling need is emerging for highly dynamic, yet risk optimized, sharing of information across traditional organizational boundarie...
Achille Fokoue, Mudhakar Srivatsa, Pankaj Rohatgi,...