Sciweavers

4897 search results - page 133 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
CBSE
2006
Springer
15 years 8 months ago
Towards Encapsulating Data in Component-Based Software Systems
Abstract. A component-based system consists of components linked by connectors. Data can reside in components and/or in external data stores. Operations on data, such as access, up...
Kung-Kiu Lau, Faris M. Taweel
ACNS
2008
Springer
138views Cryptology» more  ACNS 2008»
15 years 10 months ago
Traceable and Retrievable Identity-Based Encryption
Abstract. Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. ...
Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susil...
ACISP
1998
Springer
15 years 8 months ago
Meta Objects for Access Control: Role-Based Principals
Abstract. Most current object-based distributed systems support access control lists for access control. However, it is difficult to determine which principal information to use fo...
Thomas Riechmann, Jürgen Kleinöder
MOBILITY
2009
ACM
15 years 9 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
EDOC
2003
IEEE
15 years 9 months ago
Addressing Computational Viewpoint Design
Distributed System design is a highly complicated and non-trivial task. The problem is characterised by the need to design multi-threaded, multi-processor, and multimedia systems....
David H. Akehurst, John Derrick, A. Gill Waters