Sciweavers

661 search results - page 21 / 133
» Distributed and Secure Access Control in P2P Databases
Sort
View
DEXAW
2006
IEEE
140views Database» more  DEXAW 2006»
14 years 1 months ago
String-Matching and Update through Algebraic Signatures in Scalable Distributed Data Structures
: Scalable Distributed Data Structures (SDDSs) store large scalable files over a distributed RAM of nodes in a grid or a P2P network. The files scale transparently for the applicat...
Riad Mokadem, Witold Litwin
IASTEDSE
2004
13 years 9 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
SP
1996
IEEE
13 years 11 months ago
View-Based Access Control with High Assurance
View-based access control enables content-based and context-based security, as opposed to container-based security provided in operating systems. However, view-based access contro...
Xiaolei Qian
CSFW
2003
IEEE
14 years 28 days ago
Type-Based Distributed Access Control
A type system is presented that combines a weak form of information flow control, termed distributed access control in the paper, with typed cryptographic operations. The motivat...
Tom Chothia, Dominic Duggan, Jan Vitek
XMLSEC
2003
ACM
14 years 26 days ago
First experiences using XACML for access control in distributed systems
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...