Sciweavers

769 search results - page 104 / 154
» Policy Storage for Role-Based Access Control Systems
Sort
View
84
Voted
ESCIENCE
2006
IEEE
15 years 5 months ago
CIMA Based Remote Instrument and Data Access: An Extension into the Australian e-Science Environment
The Common Instrument Middleware Architecture (CIMA) is being used as a core component of a portal based remote instrument access system being developed as an Australian e-Science...
Ian M. Atkinson, Douglas du Boulay, Clinton Chee, ...
117
Voted
CODES
2005
IEEE
15 years 4 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
SACMAT
2006
ACM
15 years 4 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...
71
Voted
CCGRID
2009
IEEE
15 years 4 months ago
File Clustering Based Replication Algorithm in a Grid Environment
Replication in grid file systems can significantly improves I/O performance of data-intensive applications. However, most of existing replication techniques apply to individual ...
Hitoshi Sato, Satoshi Matsuoka, Toshio Endo
88
Voted
CCS
2000
ACM
15 years 3 months ago
Security enhanced mobile agents
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent and outlines security management components in agen...
Vijay Varadharajan