Sciweavers

1134 search results - page 30 / 227
» Distributed Proving in Access-Control Systems
Sort
View
INFOCOM
2005
IEEE
15 years 8 months ago
rDCF: a relay-enabled medium access control protocol for wireless ad hoc networks
—It is well known that IEEE 802.11 provides a physical layer multirate capability and, hence, MAC layer mechanisms are needed to exploit this capability. Several solutions have b...
Hao Zhu, Guohong Cao
TLDI
2010
ACM
190views Formal Methods» more  TLDI 2010»
15 years 11 months ago
Distributed programming with distributed authorization
We propose a programming language, called PCML5, for building distributed applications with distributed access control. Target applications include web-based systems in which prog...
Kumar Avijit, Anupam Datta, Robert Harper
MATA
2005
Springer
146views Communications» more  MATA 2005»
15 years 8 months ago
Distributed Authorization Framework for Mobile Agents
Abstract. Mobile agent systems provide new perspectives for distributed e-commerce applications. These applications may present specific restrictions, making mobile agent systems ...
Guillermo Navarro, Jose A. Ortega-Ruiz, Joan Ametl...
141
Voted
ICDCIT
2004
Springer
15 years 8 months ago
Vulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
Bharat K. Bhargava, Leszek Lilien
229
Voted
ESOP
2004
Springer
15 years 8 months ago
A Dependently Typed Ambient Calculus
The Ambient calculus is a successful model of distributed, mobile computation, and has been the vehicle of new ideas for resource access control. Mobility types have been used to e...
Cédric Lhoussaine, Vladimiro Sassone