Sciweavers

422 search results - page 11 / 85
» Risk management for distributed authorization
Sort
View
CCS
2006
ACM
15 years 4 months ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
104
Voted
XMLSEC
2003
ACM
15 years 5 months ago
First experiences using XACML for access control in distributed systems
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...
99
Voted
GRID
2004
Springer
15 years 5 months ago
Walden: A Scalable Solution for Grid Account Management
— A large and diverse consortium of grid clusters, as can be found in a university setting, requires a flexible authorization model that is scalable, extensible and easy to admi...
Beth A. Kirschner, Thomas J. Hacker, William A. Ad...
101
Voted
DSS
2006
104views more  DSS 2006»
15 years 14 days ago
Supply chain information sharing in a macro prediction market
This paper aims to address supply chain partners' incentives for information sharing from an information systems design perspective. Specifically, we consider a supply chain ...
Zhiling Guo, Fang Fang, Andrew B. Whinston
85
Voted
IPPS
2007
IEEE
15 years 6 months ago
Integrated Risk Analysis for a Commercial Computing Service
Utility computing has been anticipated to be the next generation of computing usage. Users have the freedom to easily switch to any commercial computing service to complete jobs w...
Chee Shin Yeo, Rajkumar Buyya