Sciweavers

1134 search results - page 41 / 227
» Distributed Proving in Access-Control Systems
Sort
View
CCS
2010
ACM
15 years 18 days ago
Adjustable autonomy for cross-domain entitlement decisions
Cross-domain information exchange is a growing problem, as business and governmental organizations increasingly need to integrate their information systems with those of partially...
Jacob Beal, Jonathan Webb, Michael Atighetchi
127
Voted
WISTP
2010
Springer
15 years 13 days ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel
136
Voted
IEEEIA
2009
15 years 9 days ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
124
Voted
CCS
2005
ACM
15 years 8 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
GRID
2008
Springer
15 years 2 months ago
Can Economics-based Resource Allocation Prove Effective in a Computation Marketplace?
Several companies offer computation on demand for a fee. More companies are expected to enter this business over the next decade, leading to a marketplace for computation resource...
Kevin L. Mills, Christopher Dabrowski