Sciweavers

505 search results - page 18 / 101
» Access Control and Trust in the Use of Widely Distributed Se...
Sort
View
ATAL
2005
Springer
14 years 1 months ago
Access control with safe role assignment for mobile agents
Mobile agent systems provide new perspectives for distributed e-commerce applications. Sea-of-Data (SoD) applications are those that need to process huge quantities of distributed...
Guillermo Navarro, Joan Borrell, Jose A. Ortega-Ru...
SEC
2008
13 years 9 months ago
Role Signatures for Access Control in Open Distributed Systems
Implementing access control efficiently and effectively in an open and distributed system is a challenging problem. One reason for this is that users requesting access to remote re...
Jason Crampton, Hoon Wei Lim
WPES
2003
ACM
14 years 1 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
GLOBECOM
2007
IEEE
14 years 2 months ago
Distributed Call Admission Protocol for Multi-Channel Multi-Radio Wireless Networks
- In this paper we propose a distributed call admission control protocol (DCAC) to provide bandwidth and delay guaranteed Quality of Service (QoS) in multihop wireless mesh network...
Yi Hu, Xiang-Yang Li, Haiming Chen, Xiaohua Jia
VLDB
2004
ACM
147views Database» more  VLDB 2004»
14 years 1 months ago
Client-Based Access Control Management for XML documents
The erosion of trust put in traditional database servers and in Database Service Providers, the growing interest for different forms of data dissemination and the concern for prot...
Luc Bouganim, François Dang Ngoc, Philippe ...