Sciweavers

213 search results - page 13 / 43
» Managing access and flow control requirements in distributed...
Sort
View
SACMAT
2004
ACM
15 years 5 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
110
Voted
FIDJI
2004
Springer
15 years 5 months ago
Task-Based Access Control for Virtual Organizations
Abstract. GOLD (Grid-based Information Models to Support the Rapid Innovation of New High Value-Added Chemicals) is concerned with the dynamic formation and management of virtual o...
Panos Periorellis, Savas Parastatidis
DSONLINE
2006
79views more  DSONLINE 2006»
15 years 15 days ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
102
Voted
COLCOM
2007
IEEE
15 years 6 months ago
Towards trust-aware access management for ad-hoc collaborations
—In an ad-hoc collaborative sharing environment, attribute-based access control provides a promising approach in defining authorization over shared resources based on users’ p...
Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin H...
CC
2008
Springer
144views System Software» more  CC 2008»
15 years 2 months ago
Control Flow Emulation on Tiled SIMD Architectures
Heterogeneous multi-core and streaming architectures such as the GPU, Cell, ClearSpeed, and Imagine processors have better power/ performance ratios and memory bandwidth than tradi...
Ghulam Lashari, Ondrej Lhoták, Michael McCo...