Sciweavers

232 search results - page 24 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
CHI
2008
ACM
14 years 10 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
ICSE
2007
IEEE-ACM
14 years 10 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...
CCGRID
2006
IEEE
14 years 3 months ago
Virtual Clusters for Grid Communities
A challenging issue facing Grid communities is that while Grids can provide access to many heterogeneous resources, the resources to which access is provided often do not match th...
Ian T. Foster, Timothy Freeman, Katarzyna Keahey, ...
IWQOS
2004
Springer
14 years 3 months ago
Towards content distribution networks with latency guarantees
This paper investigates the performance of a content distribution network designed to provide bounded content access latency. Content can be divided into multiple classes with dif...
Chengdu Huang, Tarek F. Abdelzaher
FLOPS
2006
Springer
14 years 1 months ago
Soutei, a Logic-Based Trust-Management System
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
Andrew Pimlott, Oleg Kiselyov