Sciweavers

744 search results - page 78 / 149
» The Traust Authorization Service
Sort
View
ICSOC
2004
Springer
15 years 3 months ago
An OGSA-based accounting system for allocation enforcement across HPC centers
In this paper, we present an Open Grid Services Architecture (OGSA)-based decentralized allocation enforcement system, developed with an emphasis on a consistent data model and ea...
Thomas Sandholm, Peter Gardfjäll, Erik Elmrot...
FC
1998
Springer
96views Cryptology» more  FC 1998»
15 years 2 months ago
Compliance Checking in the PolicyMaker Trust Management System
Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that rec...
Matt Blaze, Joan Feigenbaum, Martin Strauss
CHI
2005
ACM
15 years 10 months ago
Sharing the big apple: a survey study of people, place and locatability
With the advancement in technologies to locate individuals, there has been an emergence of information systems that link People-to-People-to-Geographical-Places, labeled P3Systems...
Sukeshini A. Grandhi, Quentin Jones, Samer Karam
OSDI
2002
ACM
15 years 10 months ago
Scale and Performance in the Denali Isolation Kernel
This paper describes the Denali isolation kernel, an operating system architecture that safely multiplexes a large number of untrusted Internet services on shared hardware. Denali...
Andrew Whitaker, Marianne Shaw, Steven D. Gribble
MUM
2009
ACM
198views Multimedia» more  MUM 2009»
15 years 4 months ago
Context-aware messaging: how personal, spatial and temporal constraints affect text-based communication
There are academic and commercial drivers for contextawareness to play a prominent role in the future of mobile services. Implementing a complete model of context remains an unsol...
Simon Jones, Eamonn O'Neill