Sciweavers

1147 search results - page 84 / 230
» Transformation of Access Rights
Sort
View
USENIX
2003
13 years 10 months ago
Secure and Flexible Global File Sharing
Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...
FGCS
2007
90views more  FGCS 2007»
13 years 8 months ago
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
Grid computing is a newly developed technology for complex systems with large-scale resource sharing and multi-institutional collaboration. The prominent feature of grid computing...
Xukai Zou, Yuan-Shun Dai, Xiang Ran
EUROMICRO
2004
IEEE
14 years 15 days ago
A Framework for Protecting Web Sevices with IPsec
This paper proposes a WSDL extension for describing IPsec policies for protecting Web Services communications. By using the proposed extension, a Web Service (server) informs to i...
Cássio Ditzel Kropiwiec, Edgard Jamhour, Ca...
PDS
1996
13 years 10 months ago
Towards a theory of shared data in distributed systems
We have developed a theory of sharing which captures the behaviour of programs with respect to shared data into the framework of process algebra. The core theory can describe prog...
Simon A. Dobson, Christopher P. Wadsworth
DLOG
2001
13 years 10 months ago
Preserving Modularity in XML Encoding of Description Logics
Description logics have been designed and studied in a modular way. This has allowed a methodic approach to complexity evaluation. We present a way to preserve this modularity in ...
Jérôme Euzenat