Sciweavers

704 search results - page 30 / 141
» Resource Access Control for an Internet User Agent
Sort
View
ISW
2005
Springer
15 years 3 months ago
Evaluating Access Control Policies Through Model Checking
We present a model-checking algorithm which can be used to evaluate access control policies, and a tool which implements it. The evaluation includes not only assessing whether the ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
JSSPP
2005
Springer
15 years 3 months ago
Co-scheduling with User-Settable Reservations
As grid computing becomes more commonplace, so does the importance of coscheduling these geographically distributed resourcest. Negotiating resource management and scheduling deci...
Kenneth Yoshimoto, Patricia A. Kovatch, Phil Andre...
ICISC
2007
134views Cryptology» more  ICISC 2007»
14 years 11 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
TRIDENTCOM
2005
IEEE
15 years 3 months ago
A Global X-Bone for Network Experiments
A global Internet overlay testbed is being deployed to support the distributed, shared use of resources for network research. The Global X-Bone (GX-Bone) augments the X-Bone softw...
Joseph D. Touch, Yu-Shun Wang, Venkata K. Pingali,...
WWW
2006
ACM
15 years 10 months ago
Personalization and accessibility: integration of library and web approaches
This paper describes personalization metadata standards that can be used to enable individuals to access and use resources based on a user's particular requirements. The pape...
Ann Chapman, Brian Kelly, Liddy Nevile, Andy Heath