Sciweavers

3712 search results - page 628 / 743
» Role-Based Access Control
Sort
View
SIGOPS
2008
156views more  SIGOPS 2008»
13 years 9 months ago
O2S2: enhanced object-based virtualized storage
Object based storage devices (OSDs) elevate the level of abstraction presented to clients, thereby permitting them to offer methods for managing, sharing, and securing information...
Himanshu Raj, Karsten Schwan
IJIEM
2007
113views more  IJIEM 2007»
13 years 9 months ago
Fairness concerns in digital right management models
: Digital piracy is threatening the global multimedia content industry and blindly applied coercive Digital Right Management (DRM) policies do nothing but legitimizing this piracy....
Luc Bouganim, Philippe Pucheral
IJNSEC
2007
139views more  IJNSEC 2007»
13 years 9 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
IJWGS
2007
96views more  IJWGS 2007»
13 years 9 months ago
The many faces of the integration of instruments and the grid
: Current grid technologies offer unlimited computational power and storage capacity for scientific research and business activities in heterogeneous areas all over the world. Than...
Francesco Lelli, Eric Frizziero, Michele Gulmini, ...
TII
2008
132views more  TII 2008»
13 years 9 months ago
Credential Management for Automatic Identification Solutions in Supply Chain Management
Current systems for automatic identification of goods presume a single administrative domain. However, in supply chain management systems temporary cooperations of multiple compani...
Marcel Henseler, Michael Rossberg, Guenter Schaefe...