Sciweavers

74 search results - page 8 / 15
» Distributed Access Control in CROWN Groups
Sort
View
SACMAT
2009
ACM
14 years 4 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
HOTOS
1997
IEEE
14 years 2 months ago
Security for Extensible Systems
The recent trend towards dynamically extensible systems, such as Java, SPIN or VINO, promises more powerful and flexible systems. At the same time, the impact of extensibility on...
Robert Grimm, Brian N. Bershad
JNW
2006
94views more  JNW 2006»
13 years 9 months ago
An Efficient Role Specification Management Model for Highly Distributed Environments
Abstract--Highly distributed environments such as pervasive computing environments not having global or broad control, need another attribute certificate management technique. For ...
Soomi Yang
WWIC
2005
Springer
137views Communications» more  WWIC 2005»
14 years 3 months ago
Providing Delay Guarantees and Power Saving in IEEE 802.11e Network
Recently, the 802.11e Working Group (WG) has proposed the Hybrid Coordination Function (HCF), which has a HCF Controlled Channel Access (HCCA) and an Enhanced Distributed Coordinat...
Gennaro Boggia, Pietro Camarda, F. A. Favia, Luigi...
SOSP
2003
ACM
14 years 6 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...