Sciweavers

422 search results - page 27 / 85
» Risk management for distributed authorization
Sort
View
ESORICS
2003
Springer
14 years 1 months ago
A Toolkit for Managing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. An enterprise privacy policy often ...
Michael Backes, Birgit Pfitzmann, Matthias Schunte...
FLOPS
2006
Springer
14 years 5 days ago
Soutei, a Logic-Based Trust-Management System
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
Andrew Pimlott, Oleg Kiselyov
WICSA
2004
13 years 10 months ago
PACE: An Architectural Style for Trust Management in Decentralized Applications
Distributed applications that lack a central, trustworthy authority for control and validation are properly termed decentralized. Multiple, independent agencies, or "partners...
Girish Suryanarayana, Justin R. Erenkrantz, Scott ...
HICSS
2009
IEEE
106views Biometrics» more  HICSS 2009»
14 years 3 months ago
Transmission Tariffs by Use of System and Economic Benefits
Setting electric transmission tariffs is a classical multi-objective problem. The tariff problem is particularly challenging in modern power markets where transmission has been se...
Daniel J. Cámac, Raúl C. Bastidas, W...
WDAG
1995
Springer
102views Algorithms» more  WDAG 1995»
14 years 1 days ago
Larchant-RDOSS: a Distributed Shared Persistent Memory and its Garbage Collector
Larchant-RDOSS is a distributed shared memory that persists on reliable storage across process lifetimes. Memory management is automatic: including consistent caching of data and ...
Marc Shapiro, Paulo Ferreira