Sciweavers

124 search results - page 7 / 25
» Adaptive Secure Access to Remote Services
Sort
View
PERCOM
2007
ACM
14 years 7 months ago
Middleware for Secure Home Access and Control
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Andrés Marín López, Wolfgang ...
CONCURRENCY
2002
112views more  CONCURRENCY 2002»
13 years 7 months ago
The Virtual Service Grid: an architecture for delivering high-end network services
This paper presents the design of a novel system architecture, Virtual Service Grid (VSG), for delivering high performance network services. The VSG is based on the concept of the...
Jon B. Weissman, Byoung-Dai Lee
CSREASAM
2006
13 years 9 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
WETICE
1998
IEEE
13 years 12 months ago
Using SESAME's GSS-API to add Security to Unix Applications
SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an ext...
Paul Ashley, Mark Vandenwauver, Mark Rutherford, S...
GRID
2005
Springer
14 years 1 months ago
Adaptive trust negotiation and access control for grids
— Access control in computational grids is typically provided by a combination of identity certificates and local accounts. This approach does not scale as the number of users a...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Noria...