Sciweavers

282 search results - page 32 / 57
» Private Policy Negotiation
Sort
View
OSDI
2006
ACM
14 years 8 months ago
Making Information Flow Explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
David Mazières, Eddie Kohler, Nickolai Zeld...
ICWS
2007
IEEE
13 years 10 months ago
A Situation-aware Access Control based Privacy-Preserving Service Matchmaking Approach for Service-Oriented Architecture
Service matchmaking is an important process in the operation of Service-Oriented Architecture (SOA) based systems. In this process, information from both service providers and req...
Stephen S. Yau, Junwei Liu
GRID
2004
Springer
14 years 1 months ago
From Sandbox to Playground: Dynamic Virtual Environments in the Grid
Much experience has been gained with the protocols and mechanisms needed for discovery and allocation of remote computational resources. However, the preparation of a remote compu...
Katarzyna Keahey, Karl Doering, Ian T. Foster
ICRA
2008
IEEE
197views Robotics» more  ICRA 2008»
14 years 2 months ago
Approximate optimal control of the compass gait on rough terrain
Abstract— In this paper, we explore the capabilities of actuated models of the compass gait walker on rough terrain. We solve for the optimal high-level feedback policy to negoti...
Katie Byl, Russ Tedrake
WPES
2003
ACM
14 years 1 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...