Sciweavers

807 search results - page 76 / 162
» Term Rewriting for Access Control
Sort
View
WPES
2003
ACM
15 years 8 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
133
Voted
SC
2000
ACM
15 years 8 months ago
Computing and Data Grids for Science and Engineering
We use the term “Grid” to refer to a software system that provides uniform and location independent access to geographically and organizationally dispersed, heterogeneous reso...
William E. Johnston, Dennis Gannon, Bill Nitzberg,...
115
Voted
DAGSTUHL
2003
15 years 5 months ago
PiLib: A Hosted Language for Pi-Calculus Style Concurrency
Abstract. PiLib is a library written in Scala that implements the concurrency constructs of the π-calculus. Some features of the programming language Scala, examined in the paper,...
Vincent Cremet, Martin Odersky
143
Voted
CCR
2006
96views more  CCR 2006»
15 years 3 months ago
XCP for shared-access multi-rate media
The eXplicit Control Protocol (XCP) was developed to overcome some of the limitations of TCP, such as low utilization in high bandwidth delay product networks, unstable throughput...
Filipe Abrantes, Manuel Ricardo
SOSP
2003
ACM
16 years 15 days ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...