Sciweavers

579 search results - page 48 / 116
» Security Enforcement Model for Distributed Usage Control
Sort
View
ICDCS
2008
IEEE
14 years 2 months ago
Strong WORM
We introduce a Write-Once Read-Many (WORM) storage system providing strong assurances of data retention and compliant migration, by leveraging trusted secure hardware in close dat...
Radu Sion
ICC
2009
IEEE
154views Communications» more  ICC 2009»
14 years 2 months ago
Load Balancing vs. Distributed Rate Limiting: An Unifying Framework for Cloud Control
— With the expansion of cloud-based services, the question as to how to control usage of such large distributed systems has become increasingly important. Load balancing (LB), an...
Rade Stanojevic, Robert Shorten
MATA
2005
Springer
146views Communications» more  MATA 2005»
14 years 1 months ago
Distributed Authorization Framework for Mobile Agents
Abstract. Mobile agent systems provide new perspectives for distributed e-commerce applications. These applications may present specific restrictions, making mobile agent systems ...
Guillermo Navarro, Jose A. Ortega-Ruiz, Joan Ametl...
ESCIENCE
2006
IEEE
13 years 9 months ago
Domain Based Access Control Model for Distributed Collaborative Applications
This paper describes the design and development of a flexible domain-based access control infrastructure for distributed Collaborative Environments. The paper proposes extensions ...
Yuri Demchenko, Cees de Laat, Leon Gommans, Ren&ea...
SACMAT
2011
ACM
12 years 10 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we de...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...