Sciweavers

704 search results - page 31 / 141
» Resource Access Control for an Internet User Agent
Sort
View
ICDCIT
2004
Springer
15 years 3 months ago
Using Schemas to Simplify Access Control for XML Documents
Abstract. Organizations are increasingly using the the eXtensible Markup Language (XML) for document representation and exchange on the Web. To protect an XML document from unautho...
Indrakshi Ray, Marianna Muller
CN
2007
111views more  CN 2007»
14 years 9 months ago
Key management for content access control in a hierarchy
The need for content access control in hierarchies (CACH) appears naturally in all contexts where a set of users have different access rights to a set of resources. The hierarchy...
H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Be...
CONCURRENCY
2008
105views more  CONCURRENCY 2008»
14 years 10 months ago
Coordinating access control in grid services
We describe how to control the cumulative use of distributed grid resources by using coordination aware policy decision points (coordinated PDPs) and an SQL database to hold "...
David W. Chadwick, Linying Su, Romain Laborde
AICT
2006
IEEE
126views Communications» more  AICT 2006»
15 years 3 months ago
A Framework to Add AAA Functionalities in IP Multicast
Multicasting, as an operational paradigm, has not been widely adopted until now, in spite of the advantages of its lower resource utilization and bandwidth conservation. This is d...
Salekul Islam, J. William Atwood
CONCURRENCY
1998
83views more  CONCURRENCY 1998»
14 years 9 months ago
Supporting universal personal computing on the Internet with Java and CORBA
Universal Personal Computing (UPC) supports nomadic computing on the Internet by allowing mobile users to access their personalized computing resources anywhere on the Internet us...
Jinsong Zhu, Maria Törö, Victor C. M. Le...