Sciweavers

73 search results - page 8 / 15
» PeerAccess: a logic for distributed authorization
Sort
View
STOC
2006
ACM
170views Algorithms» more  STOC 2006»
15 years 9 months ago
Hardness of approximate two-level logic minimization and PAC learning with membership queries
Producing a small DNF expression consistent with given data is a classical problem in computer science that occurs in a number of forms and has numerous applications. We consider ...
Vitaly Feldman
80
Voted
JCS
2006
118views more  JCS 2006»
14 years 9 months ago
Language based policy analysis in a SPKI Trust Management System
Abstract-- SPKI/SDSI is a standard for issuing authorization and name certificates. SPKI/SDSI can be used to implement a Trust Management System, where the policy for resource acce...
Arun K. Eamani, A. Prasad Sistla
CSFW
2007
IEEE
15 years 3 months ago
Do As I SaY! Programmatic Access Control with Explicit Identities
We address the programmatic realization of the access control model of security in distributed systems. Our aim is e the gap between abstract/declarative policies and their concre...
Andrew Cirillo, Radha Jagadeesan, Corin Pitcher, J...
SLOGICA
2002
81views more  SLOGICA 2002»
14 years 9 months ago
Bicartesian Coherence
A survey is given of results about coherence for categories with finite products and coproducts. For these results, which were published previously by the authors in several places...
Kosta Dosen, Zoran Petric
88
Voted
MM
2003
ACM
146views Multimedia» more  MM 2003»
15 years 2 months ago
Supporting timeliness and accuracy in distributed real-time content-based video analysis
Real-time content-based access to live video data requires content analysis applications that are able to process the video data at least as fast as the video data is made availab...
Viktor S. Wold Eide, Frank Eliassen, Ole-Christoff...