Sciweavers

1627 search results - page 117 / 326
» On context in authorization policy
Sort
View
ECRTS
2003
IEEE
14 years 4 months ago
A Synthetic Utilization Bound for Aperiodic Tasks with Resource Requirements
Utilization bounds for schedulability of aperiodic tasks are new in real-time scheduling literature. All aperiodic bounds known to date apply only to independent tasks. They eithe...
Tarek F. Abdelzaher, Vivek Sharma
PKC
1998
Springer
126views Cryptology» more  PKC 1998»
14 years 2 months ago
Certifying Trust
A basic function of all signatures, digital or not, is to express trust and authority, explicit or implied. This is especially the case with digital signatures used in certificates...
Ilari Lehti, Pekka Nikander
DBSEC
1998
115views Database» more  DBSEC 1998»
14 years 11 hour ago
Secure Mediation: Requirements and Design
In this paper1 we discuss the security requirements for mediation, and present our approach towards satisfying them, with an emphasis on con dentiality and authenticity. Furthermo...
Joachim Biskup, Ulrich Flegel, Yücel Karabulu...
JASSS
1998
82views more  JASSS 1998»
13 years 10 months ago
Qualitative modeling and simulation of socio-economic phenomena
This paper describes an application of recently developed qualitative reasoning techniques to complex, socio{economic allocation problems. We explain why we believe traditional op...
Giorgio Brajnik, Marji Lines
MMMACNS
2010
Springer
13 years 9 months ago
Credentials Management for High-Value Transactions
Abstract. Partner key management (PKM) is an interoperable credential management protocol for online commercial transactions of high value. PKM reinterprets traditional public key ...
Glenn S. Benson, Shiu-Kai Chin, Sean Croston, Kart...