Sciweavers

6555 search results - page 1150 / 1311
» Secure attribute-based systems
Sort
View
TKDE
2008
177views more  TKDE 2008»
15 years 3 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
TWC
2008
176views more  TWC 2008»
15 years 3 months ago
Key Management for UMTS MBMS
3GPP 33.246 proposes Key Management Mechanism (KMM) to distribute security keys for Universal Mobile Telecommunications System (UMTS) Multimedia Broadcast and Multicast Service (MB...
Shin-Ming Cheng, Wei-Ru Lai, Phone Lin, Kwang-Chen...
CORR
2004
Springer
142views Education» more  CORR 2004»
15 years 3 months ago
Global Grids and Software Toolkits: A Study of Four Grid Middleware Technologies
: Grid is an infrastructure that involves the integrated and collaborative use of computers, networks, databases and scientific instruments owned and managed by multiple organizati...
Parvin Asadzadeh, Rajkumar Buyya, Chun Ling Kei, D...
COMCOM
2000
125views more  COMCOM 2000»
15 years 3 months ago
On object initialization in the Java bytecode
Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs ...
Stephane Doyon, Mourad Debbabi
EL
2002
181views more  EL 2002»
15 years 3 months ago
Aspects of networking in multiplayer computer games
Distributed, real-time multiplayer computer games (MCGs) are in the vanguard of utilizing the networking possibilities. Although related research have been done in military simulat...
Jouni Smed, Timo Kaukoranta, Harri Hakonen
« Prev « First page 1150 / 1311 Last » Next »