Sciweavers

579 search results - page 41 / 116
» Access control management for ubiquitous computing
Sort
View
HPDC
2000
IEEE
14 years 11 days ago
Managing Network Resources in Condor
Data-intensive applications in the Condor High Throughput Computing environment can place heavy demands on network resources for checkpointing and remote data access. We have deve...
Jim Basney, Miron Livny
SACMAT
2003
ACM
14 years 1 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
ICN
2005
Springer
14 years 1 months ago
Client-Controlled QoS Management in Networked Virtual Environments
In this paper, we propose an architecture to regulate the bandwidth usage of multimedia streams in networked virtual environments. In this architecture, intelligent proxies are pla...
Patrick Monsieurs, Maarten Wijnants, Wim Lamotte
APNOMS
2006
Springer
13 years 11 months ago
On the Security of Attribute Certificate Structuring for Highly Distributed Computing Environments
For an efficient role based access control using attribute certificate in highly distributed computing environments, we use a technique of structuring role specification certificat...
Soomi Yang
EUROCRYPT
1998
Springer
14 years 6 days ago
Quorum-Based Secure Multi-party Computation
Abstract. This paper describes e cient protocols for multi-party computations that are information-theoretically secure against passive attacks. The results presented here apply to...
Donald Beaver, Avishai Wool