Sciweavers

804 search results - page 62 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
SWS
2004
ACM
15 years 10 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
PC
2002
114views Management» more  PC 2002»
15 years 4 months ago
Optimizing noncontiguous accesses in MPI-IO
The I/O access patterns of many parallel applications consist of accesses to a large number of small, noncontiguous pieces of data. If an application's I/O needs are met by m...
Rajeev Thakur, William Gropp, Ewing L. Lusk
AINA
2007
IEEE
15 years 11 months ago
A Decentralized Authorization Architecture
We present a decentralized authorization architecture based on capabilities in which parties are able to exercise full control over their resources or delegate it in an ad-hoc man...
Feike W. Dillema, Simone Lupetti, Tage Stabell-Kul...
CSCW
2010
ACM
16 years 1 months ago
Pitfalls of information access with visualizations in remote collaborative analysis
In a world of widespread information access, information can overwhelm collaborators, even with visualizations to help. We extend prior work to study the effect of shared informat...
Aruna D. Balakrishnan, Susan R. Fussell, Sara B. K...
SAINT
2003
IEEE
15 years 9 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta