Sciweavers

354 search results - page 30 / 71
» Key management for content access control in a hierarchy
Sort
View
78
Voted
USENIX
2003
14 years 11 months ago
Secure and Flexible Global File Sharing
Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...
IEAAIE
2003
Springer
15 years 2 months ago
UMAS Learning Requirement for Controlling Network Resources
- This paper presents an intelligent User Manager Agent System (UMAS) in which it has a capability of making a management decision for balancing the network load with the users’ ...
Abdullah Gani, Nasser Abouzakhar, Gordon A. Manson
ICDCS
2010
IEEE
14 years 11 months ago
Mistral: Dynamically Managing Power, Performance, and Adaptation Cost in Cloud Infrastructures
—Server consolidation based on virtualization is a key ingredient for improving power efficiency and resource utilization in cloud computing infrastructures. However, to provide...
Gueyoung Jung, Matti A. Hiltunen, Kaustubh R. Josh...
61
Voted
DRM
2008
Springer
14 years 11 months ago
Enforcing DRM policies across applications
In this paper we present Trishul-UCON (T-UCON), a DRM system based on the UCONABC model. T-UCON is designed to be capable of enforcing not only application-specific policies, as a...
Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabrie...
SISW
2003
IEEE
15 years 3 months ago
Decentralized Authentication Mechanisms for Object-based Storage Devices
Network-attached object-based storage separates data-path from control-path and enables direct interaction between clients and the storage devices. Clients interact with the file...
Vishal Kher, Yongdae Kim