Sciweavers

744 search results - page 116 / 149
» The Traust Authorization Service
Sort
View
DL
2000
Springer
161views Digital Library» more  DL 2000»
15 years 2 months ago
Patron-augmented digital libraries
Digital library research is mostly focused on the generation of large collections of multimedia resources and state-ofthe-art tools for their indexing and retrieval. However, digi...
Dion Hoe-Lian Goh, John J. Leggett
INFOCOM
1999
IEEE
15 years 2 months ago
User-Friendly Access Control for Public Network Ports
We are facing a growing user demand for ubiquitous Internet access. As a result, network ports and wireless LANs are becoming common in public spaces inside buildings such as loung...
Guido Appenzeller, Mema Roussopoulos, Mary Baker
ICDCS
1998
IEEE
15 years 2 months ago
A Mechanism for Establishing Policies for Electronic Commerce
This paper introduces a mechanism for establishing policies for electronic commerce in a uni ed and secure manner. A commercial policy can be viewed as the embodiment of a contrac...
Naftaly H. Minsky, Victoria Ungureanu
PKC
1999
Springer
86views Cryptology» more  PKC 1999»
15 years 2 months ago
Preserving Privacy in Distributed Delegation with Fast Certificates
Abstract. In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and w...
Pekka Nikander, Yki Kortesniemi, Jonna Partanen
FTDCS
1997
IEEE
15 years 2 months ago
The Saga Security System: A Security Architecture for Open Distributed Systems
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The auth...
Masakazu Soshi, Mamoru Maekawa