Sciweavers

243 search results - page 39 / 49
» Location-Aware Authentication and Access Control
Sort
View
EGC
2005
Springer
14 years 1 months ago
Experiences of Applying Advanced Grid Authorisation Infrastructures
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured that the security mechanisms needed to support Grid based collaborations are at l...
Richard O. Sinnott, A. J. Stell, David W. Chadwick...
ICPP
2002
IEEE
14 years 19 days ago
Integrating Trust into Grid Resource Management Systems
Grid computing systems that have been the focus of much research activities in recent years provide a virtual framework for controlled sharing of resources across institutional bo...
Farag Azzedin, Muthucumaru Maheswaran
ISCC
1999
IEEE
121views Communications» more  ISCC 1999»
13 years 12 months ago
Customer Service Management: Towards a Management Information Base for an IP Connectivity Service
Customer Service Management (CSM) offers a management interface between customer and service provider, which enables customers to individually monitor and control their subscribed...
Michael Langer, Stefan Loidl, Michael Nerb
ACMICEC
2007
ACM
163views ECommerce» more  ACMICEC 2007»
13 years 11 months ago
Digital rights management using a mobile phone
This paper focuses on the problem of preventing illegal copying of digital assets without jeopardising the right of legitimate licence holders to transfer content between their ow...
Imad M. Abbadi, Chris J. Mitchell
DSONLINE
2006
79views more  DSONLINE 2006»
13 years 7 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang