Sciweavers

422 search results - page 8 / 85
» Risk management for distributed authorization
Sort
View
GCC
2004
Springer
14 years 23 days ago
XML Based X.509 Authorization in CERNET Grid
: This paper presents an authorization solution for resource management and control developing as a part of the China Education and Research Network (CERNET) to perform fine-graine...
Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li, Ping R...
EOR
2006
105views more  EOR 2006»
13 years 7 months ago
Evaluating cost taxonomies for information systems management
The consideration of costs, benefits and risks underpin many Information System (IS) evaluation decisions. Yet, vendors and project-champions alike tend to identify and focus much...
Zahir Irani, Ahmad Ghoneim, Peter E. D. Love
COMPSAC
2001
IEEE
13 years 11 months ago
Certificate Based Authorization Simulation System
Using certificates for distributed authorizations in computer network systems has been discussed in the literature. However real implementations of the concept are rarely seen. In...
Jie Dai, Jim Alves-Foss
PVLDB
2010
104views more  PVLDB 2010»
13 years 5 months ago
MCDB-R: Risk Analysis in the Database
Enterprises often need to assess and manage the risk arising from uncertainty in their data. Such uncertainty is typically modeled as a probability distribution over the uncertain...
Peter J. Haas, Christopher M. Jermaine, Subi Arumu...
HPDC
1998
IEEE
13 years 11 months ago
Authorization for Metacomputing Applications
One of the most difficult problems to be solved by metacomputing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved ...
G. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman