Sciweavers

5790 search results - page 45 / 1158
» Distributed programming with distributed authorization
Sort
View
SPIN
2001
Springer
14 years 4 days ago
Transformations for Model Checking Distributed Java Programs
Abstract. This paper describes three program transformations that extend the scope of model checkers for Java programs to include distributed programs, i.e., multi-process programs...
Scott D. Stoller, Yanhong A. Liu
IADIS
2004
13 years 9 months ago
Authorization of User Profile Access in Identity Management
Distributed management of user profiles and identities allow reuse of profile information for different personalization services but also raises privacy issues. Users need a possi...
Wolfgang Woerndl
ESORICS
2010
Springer
13 years 8 months ago
An Authorization Framework Resilient to Policy Evaluation Failures
Abstract. In distributed computer systems, it is possible that the evaluation of an authorization policy may suffer unexpected failures, perhaps because a sub-policy cannot be eval...
Jason Crampton, Michael Huth
IPPS
2000
IEEE
14 years 3 days ago
Safe Caching in a Distributed File System for Network Attached Storage
In a distributed file system built on network attached storage, client computers access data directly from shared storage, rather than submitting I/O requests through a server. W...
Randal C. Burns, Robert M. Rees, Darrell D. E. Lon...
EDBT
2008
ACM
95views Database» more  EDBT 2008»
14 years 7 months ago
Zerber: r-confidential indexing for distributed documents
To carry out work assignments, small groups distributed within a larger enterprise often need to share documents among themselves while shielding those documents from others'...
Sergej Zerr, Elena Demidova, Daniel Olmedilla, Wol...