Sciweavers

2560 search results - page 315 / 512
» Securing VO Management
Sort
View
116
Voted
EUROPKI
2004
Springer
15 years 10 months ago
The EuroPKI Experience
Abstract. This paper discusses the technical and management experience gained in the day-by-day operation of the EuroPKI infrastructure. First the context where EuroPKI was born is...
Antonio Lioy, Marius Marian, Natalia Moltchanova, ...
WISA
2004
Springer
15 years 10 months ago
Inconsistency Detection of Authorization Policies in Distributed Component Environment
In distributed component environment, a Role-Based Access Control (RBAC) server manages all authorization policies of components in the same domains whereas the components are dist...
Chang-Joo Moon, Hoh Peter In
135
Voted
SAC
2010
ACM
15 years 10 months ago
Secret interest groups (SIGs) in social networks with an implementation on Facebook
In this paper we present the first framework that allows the creation of Secret Interest Groups (SIGs) in Online Social Networks; SIGs are self managed groups formed outside of t...
Alessandro Sorniotti, Refik Molva
FC
2003
Springer
104views Cryptology» more  FC 2003»
15 years 10 months ago
On the Economics of Anonymity
Decentralized anonymity infrastructures are still not in wide use today. While there are technical barriers to a secure robust design, our lack of understanding of the incentives t...
Alessandro Acquisti, Roger Dingledine, Paul F. Syv...
GCC
2003
Springer
15 years 10 months ago
Information Grid Toolkit: Infrastructure of Shanghai Information Grid
A fundamental problem that confronts Shanghai Information Grid is to adopt a good Grid toolkit, since the “de facto” standard Globus Toolkit does not support Information Grid w...
Xinhua Lin, Qianni Deng, Xinda Lu