Sciweavers

2335 search results - page 99 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
ICPP
2005
IEEE
15 years 10 months ago
Distributed Access Control in CROWN Groups
Security in collaborative groups is an active research topic and has been recognized by many organizations in the past few years. In this paper, we propose a fine-grained and attr...
Jinpeng Huai, Yu Zhang, Xianxian Li, Yunhao Liu
CAISE
1999
Springer
15 years 9 months ago
Applying Graph Reduction Techniques for Identifying Structural Conflicts in Process Models
Abstract. The foundation of a process model lies in its control flow specifications. Using a generic process modeling language for workflows, we show how a control flow specificati...
Wasim Sadiq, Maria E. Orlowska
AGENTS
2000
Springer
15 years 9 months ago
Ant-like missionaries and cannibals: synthetic pheromones for distributed motion control
Many applied problems in domains such as military operations, manufacturing, and logistics require that entities change location under certain constraints. These problems are trad...
H. Van Dyke Parunak, Sven Brueckner
SOSP
2009
ACM
16 years 1 months ago
Fabric: a platform for secure distributed computation and storage
Fabric is a new system and language for building secure distributed information systems. It is a decentralized system that allows heterogeneous network nodes to securely share bot...
Jed Liu, Michael D. George, K. Vikram, Xin Qi, Luc...
SACMAT
2009
ACM
15 years 11 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...