Sciweavers

2110 search results - page 9 / 422
» Delegation Modeling with Paradigm
Sort
View
EUROCRYPT
2010
Springer
15 years 8 months ago
Bonsai Trees, or How to Delegate a Lattice Basis
We introduce a new lattice-based cryptographic structure called a bonsai tree, and use it to resolve some important open problems in the area. Applications of bonsai trees include...
David Cash, Dennis Hofheinz, Eike Kiltz, Chris Pei...
160
Voted
MEDES
2010
ACM
14 years 10 months ago
Negotiating and delegating obligations
In this paper, we describe a security model where users are allowed to control their obligations partially or totally, depending on the security policy. The main motivation of our...
Meriam Ben-Ghorbel-Talbi, Frédéric C...
136
Voted
WIAS
2008
98views more  WIAS 2008»
15 years 3 months ago
Delegations guided by trust and autonomy
This paper explores delegation decisions predicated on models of trust and autonomy among agents. In socially rich environments, trust and autonomy of artificial agents are key att...
Henry Hexmoor, Shahram Rahimi, Rachil Chandran
CASCON
1996
113views Education» more  CASCON 1996»
15 years 5 months ago
Network management views using delegated agents
The lack of an appropriate external data model is one of the reasons for the dearth of eective network management applications. Many network management computations over Managemen...
Germán S. Goldszmidt
129
Voted
AINA
2007
IEEE
15 years 10 months ago
Flexible and Manageable Delegation of Authority in RBAC
One of the most challenging problems in managing large networks is the complexity of security administration. Role based access control (RBAC) has become the predominant model for...
Tuan-Anh Nguyen, Linying Su, George Inman, David W...