Sciweavers

221 search results - page 31 / 45
» Delegation in Role-Based Access Control
Sort
View
DBSEC
2009
110views Database» more  DBSEC 2009»
14 years 1 days ago
Distributed Privilege Enforcement in PACS
Abstract. We present a new access control mechanism for P2P networks with distributed enforcement, called P2P Access Control System (PACS). PACS enforces powerful access control mo...
Christoph Sturm, Ela Hunt, Marc H. Scholl
SP
2007
IEEE
183views Security Privacy» more  SP 2007»
14 years 5 months ago
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
John Bethencourt, Amit Sahai, Brent Waters
SRDS
2003
IEEE
14 years 4 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
IADIS
2004
14 years 10 days ago
Access Management in Federated Digital Libraries
With the growth in digital libraries and standardization of protocols for metadata sharing, it is becoming feasible to build federated discovery services which aggregate metadata ...
Kailash Bhoopalam, Kurt Maly, Mohammad Zubair, Rav...
CLADE
2003
IEEE
14 years 4 months ago
G-Monitor: A Web Portal for Monitoring and Steering Application Execution on Global Grids
As Grids are emerging as the next-generation computing platform, the need for Web-based portals that hide low level details of accessing Grid services for deployment and execution ...
Martin Placek, Rajkumar Buyya