Sciweavers

1134 search results - page 47 / 227
» Distributed Proving in Access-Control Systems
Sort
View
108
Voted
NSPW
2006
ACM
15 years 8 months ago
Inconsistency in deception for defense
The use of deception is one of many defensive techniques being explored today. In the past, defenders of systems have used deception haphazardly, but now researchers are developin...
Vicentiu Neagoe, Matt Bishop
121
Voted
CSFW
2004
IEEE
15 years 6 months ago
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
Moritz Y. Becker, Peter Sewell
117
Voted
GRID
2008
Springer
15 years 2 months ago
A Secure Grid Medical Data Manager Interfaced to the gLite Middleware
The medical community is producing and manipulating a tremendous volume of digital data for which computerized archiving, processing and analysis is needed. Grid infrastructures ar...
Johan Montagnat, Ákos Frohner, Daniel Jouve...
ECRTS
2005
IEEE
15 years 8 months ago
A Robust Implicit Access Protocol for Real-Time Wireless Collaboration
Advances in wireless technology have brought us closer to extensive deployment of distributed real-time embedded systems connected through a wireless channel. The medium access co...
Tanya L. Crenshaw, Ajay Tirumala, Spencer Hoke, Ma...
130
Voted
CCGRID
2002
IEEE
15 years 7 months ago
Towards Trust-Aware Resource Management in Grid Computing Systems
Resource management is a central part of a Grid computing system. In a large-scale wide-area system such as the Grid, security is a prime concern. One approach is to be conservati...
Farag Azzedin, Muthucumaru Maheswaran