Sciweavers

6555 search results - page 1088 / 1311
» Secure attribute-based systems
Sort
View
DIM
2006
ACM
15 years 9 months ago
User centricity: a taxonomy and open issues
User centricity is a significant concept in federated identity management (FIM), as it provides for stronger user control and privacy. However, several notions of user-centricity...
Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas ...
120
Voted
SIGUCCS
2005
ACM
15 years 9 months ago
A case study: implementing novell identity management at Drew University
Starting in 2003, Drew University began a process to replace its manual account management procedures with an automated provisioning system based upon Novell technologies. Over th...
E. Axel Larsson
ICEIS
2000
IEEE
15 years 8 months ago
Architectural Considerations with Distributed Computing
We understand distributed systems as a collection of distributed computation resources that work together as one harmonious system. It is the great achievement of computer network...
Yibing Wang, Robert M. Hyatt, Barrett R. Bryant
155
Voted
POPL
1999
ACM
15 years 8 months ago
Typed Memory Management in a Calculus of Capabilities
An increasing number of systems rely on programming language technology to ensure safety and security of low-level code. Unfortunately, these systems typically rely on a complex, ...
Karl Crary, David Walker, J. Gregory Morrisett
159
Voted
ECBS
1996
IEEE
127views Hardware» more  ECBS 1996»
15 years 7 months ago
Domain Engineering: The Challenge, Status, and Trends
Naval Surface Warfare Center Dahlgren Division; under joint sponsorship of the Office of Naval Research; the Naval Command, Control, and Ocean Surveillance Center; and the Naval S...
Stephanie White, Michael Edwards
« Prev « First page 1088 / 1311 Last » Next »