Sciweavers

5790 search results - page 18 / 1158
» Distributed programming with distributed authorization
Sort
View
PCM
2009
Springer
98views Multimedia» more  PCM 2009»
14 years 6 days ago
Secure Domain Architecture for Interoperable Content Distribution
Authorized domains are used to share digital content among multiple devices without violating the copyright issues. However, if a domain is composed of multiple devices supporting ...
Lei Lei Win, Tony Thomas, Sabu Emmanuel, Mohan S. ...
JASIS
2002
76views more  JASIS 2002»
13 years 7 months ago
Duality revisited: Construction of fractional frequency distributions based on two dual Lotka laws
Fractional frequency distributions of e.g. authors with a certain (fractional) number of papers are very irregular and, therefore, not easy to model or to explain. This paper give...
Leo Egghe, I. K. Ravichandra Rao
HPDC
1998
IEEE
13 years 12 months ago
Authorization for Metacomputing Applications
One of the most difficult problems to be solved by metacomputing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved ...
G. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman