Sciweavers

5790 search results - page 3 / 1158
» Distributed programming with distributed authorization
Sort
View
IPPS
2007
IEEE
14 years 1 months ago
FixD : Fault Detection, Bug Reporting, and Recoverability for Distributed Applications
Model checking, logging, debugging, and checkpointing/recovery are great tools to identify bugs in small sequential programs. The direct application of these techniques to the dom...
Cristian Tapus, David A. Noblet
WISA
2004
Springer
14 years 28 days ago
Inconsistency Detection of Authorization Policies in Distributed Component Environment
In distributed component environment, a Role-Based Access Control (RBAC) server manages all authorization policies of components in the same domains whereas the components are dist...
Chang-Joo Moon, Hoh Peter In
ICDCS
1993
IEEE
13 years 11 months ago
Proxy-Based Authorization and Accounting for Distributed Systems
Despite recent widespread interest in the secure authentication of principals across computer networks there has been considerably less discussion of distributed mechanisms to sup...
B. Clifford Neuman
JCS
2007
103views more  JCS 2007»
13 years 7 months ago
Risk management for distributed authorization
Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all asse...
Christian Skalka, Xiaoyang Sean Wang, Peter C. Cha...
DEXAW
2010
IEEE
172views Database» more  DEXAW 2010»
13 years 8 months ago
Distributed Semantic Video Tagging for Peer-to-Peer Authoring System
Abstract--In the context of a project aimed at the development of a cooperative and distributed Authoring System to facilitate the production, sharing, and integration of new and e...
Giuseppe Rizzo, Biagio Meirone, Pierluigi Di Nunzi...