Sciweavers

2335 search results - page 145 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
CCS
2007
ACM
15 years 9 months ago
Efficient policy analysis for administrative role based access control
Administrative RBAC (ARBAC) policies specify how Role-Based Access Control (RBAC) policies may be changed by each administrator. It is often difficult to fully understand the effe...
Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, M...
167
Voted
ISN
2000
Springer
158views Communications» more  ISN 2000»
15 years 8 months ago
Load Balancing for a Distributed CORBA-Based SCP
This paper examines load balancing issues relating to a distributed CORBA-based Service Control Point. Two types of load balancing strategies are explored through simulation studie...
Conor McArdle, Niklas Widell, Christian Nyberg, Er...
JCM
2008
75views more  JCM 2008»
15 years 5 months ago
A Secure Mobile Agents Platform
Abstract--Mobile Agents is a new paradigm for distributed computing where security is very essential to the acceptance of this paradigm in a large scale distributed environment. In...
Leila Ismail
MOBISYS
2007
ACM
16 years 4 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
142
Voted
ACSAC
2002
IEEE
15 years 10 months ago
A Context-Aware Security Architecture for Emerging Applications
We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of securi...
Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan,...