Sciweavers

1168 search results - page 203 / 234
» The Role of Trust Management in Distributed Systems Security
Sort
View
SACMAT
2009
ACM
15 years 6 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
COMPSAC
2002
IEEE
15 years 4 months ago
Constructing an EJB Application in a WFMS
A workflow system provides enterprises the automatic and paperless process management. The idea of Enterprise JavaBeans (EJB) is to utilize components from various vendors to cons...
Jian-Wei Wang, Ta-Chun Lin, Hwai-Jong Hsu, Feng-Ji...
CCGRID
2006
IEEE
15 years 5 months ago
Learning-Based Negotiation Strategies for Grid Scheduling
One of the key requirement for Grid infrastructures is the ability to share resources with nontrivial qualities of service. However, resource management in a decentralized infrast...
Jiadao Li, Ramin Yahyapour
ICDCS
2008
IEEE
15 years 6 months ago
Fast Path Session Creation on Network Processors
The security gateways today are required not only to block unauthorized accesses by authenticating packet headers, but also by inspecting connection states to defend against malic...
Bo Xu, Yaxuan Qi, Fei He, Zongwei Zhou, Yibo Xue, ...
CCS
2009
ACM
15 years 6 months ago
Multi-party off-the-record messaging
Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation i...
Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy,...