Sciweavers

83 search results - page 3 / 17
» Identity Delegation in Policy Based Systems
Sort
View
POLICY
2004
Springer
13 years 11 months ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
ESCIENCE
2005
IEEE
13 years 12 months ago
Identity-Based Cryptography for Grid Security
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Hoon Wei Lim, Kenneth G. Paterson
SASO
2009
IEEE
14 years 1 months ago
Patterns of Delegate MAS
Delegate MAS has been proposed and investigated as an integrated coordination technique for so-called self-organising coordination-and-control applications. Delegate MAS consist o...
Tom Holvoet, Danny Weyns, Paul Valckenaers
ETRICS
2006
13 years 10 months ago
Policy-Based Integration of User and Provider-Sided Identity Management
Abstract. Depending on whether the users or the providers are performing it, Identity Management (IM) traditionally has different meanings. For users, IM means to choose between on...
Wolfgang Hommel
NDSS
2002
IEEE
13 years 11 months ago
PAMINA: A Certificate Based Privilege Management System
In this paper we present PAMINA (Privilege Administration and Management INfrAstructure), a privilege management system using authorization certificates. Our system supports distr...
Zoltán Nochta, Peter Ebinger, Sebastian Abe...