咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献
  • 5 篇 会议

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 9 篇 计算机科学与技术...
    • 4 篇 电气工程
    • 3 篇 信息与通信工程
    • 3 篇 软件工程
    • 2 篇 控制科学与工程
    • 1 篇 网络空间安全
  • 1 篇 理学
    • 1 篇 数学

主题

  • 12 篇 distributed auth...
  • 4 篇 access control
  • 3 篇 trust management
  • 2 篇 security
  • 1 篇 internet of thin...
  • 1 篇 generic design p...
  • 1 篇 world wide web
  • 1 篇 languages
  • 1 篇 data processing
  • 1 篇 safety
  • 1 篇 ecosystems
  • 1 篇 superconducting ...
  • 1 篇 health care equi...
  • 1 篇 outsourcing data...
  • 1 篇 logic gates
  • 1 篇 nonmonotonic rea...
  • 1 篇 hospitals
  • 1 篇 trading
  • 1 篇 commerce
  • 1 篇 logic-based acce...

机构

  • 2 篇 univ vermont dep...
  • 1 篇 school of softwa...
  • 1 篇 tech univ berlin...
  • 1 篇 university of il...
  • 1 篇 univ vermont bur...
  • 1 篇 ucl dept informa...
  • 1 篇 hp labs bristol ...
  • 1 篇 univ calgary cal...
  • 1 篇 carnegie mellon ...
  • 1 篇 forth inst comp ...
  • 1 篇 department of co...
  • 1 篇 world wide web c...
  • 1 篇 school of comput...
  • 1 篇 università di na...

作者

  • 2 篇 wang x. sean
  • 2 篇 skalka christian
  • 1 篇 thatmann dirk
  • 1 篇 wang lie
  • 1 篇 marianne winslet...
  • 1 篇 lain antonio
  • 1 篇 chapin peter
  • 1 篇 skalka c.
  • 1 篇 bauer lujo
  • 1 篇 wang x.
  • 1 篇 chapin peter c.
  • 1 篇 swasey david
  • 1 篇 piero a. bonatti
  • 1 篇 zhang huanguo
  • 1 篇 zhang lan
  • 1 篇 genitsaridi irin...
  • 1 篇 charles c. zhang
  • 1 篇 reiter michael k...
  • 1 篇 mowbray miranda
  • 1 篇 kahan j

语言

  • 10 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=distributed authorization"
12 条 记 录,以下是1-10 订阅
排序:
distributed authorization in Complex Multi Entity-Driven API Ecosystems  8
Distributed Authorization in Complex Multi Entity-Driven API...
收藏 引用
8th International Conference on Signal Processing and Communication Systems, (ICSPCS)
作者: Thatmann, Dirk Tech Univ Berlin Telekom Innovat Labs Serv Ctr Networking SNET D-10587 Berlin Germany
In certain business sectors adapting to modern and cost reducing technologies and service models can be still a challenge. This especially applies for health care related SME, such as hospitals, where cost reduction r... 详细信息
来源: 评论
WDAI: a simple World Wide Web distributed authorization infrastructure
收藏 引用
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING 1999年 第11-16期31卷 1599-1609页
作者: Kahan, J World Wide Web Consortium W3C INRIA F-38330 Montbonnot St Martin France
The World Wide Web (W3) has the potential to link different kinds of documents into hypertext collections and to distribute such collections among many document servers. distributed collections can bring forth new W3 ... 详细信息
来源: 评论
Risk management for distributed authorization
收藏 引用
JOURNAL OF COMPUTER SECURITY 2007年 第4期15卷 447-489页
作者: Skalka, Christian Wang, X. Chapin, Peter Univ Vermont Burlington VT USA
distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all assertions as equally valid up to certifica... 详细信息
来源: 评论
DEAL: A distributed authorization Language for Ambient Intelligence
收藏 引用
INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE 2011年 第4期3卷 9-24页
作者: Genitsaridi, Irini Bikakis, Antonis Antoniou, Grigoris FORTH Inst Comp Sci Informat Syst Lab Iraklion Greece UCL Dept Informat Studies London England
authorization is an open problem in Ambient Intelligence environments. The difficulty of implementing authorization policies lies in the open and dynamic nature of such environments. The information is distributed amo... 详细信息
来源: 评论
Dominator-Tree Analysis for distributed authorization
Dominator-Tree Analysis for Distributed Authorization
收藏 引用
3rd ACM SIGPLAN Workshop on Programming Languages and Analysis for Security
作者: Mowbray, Miranda Lain, Antonio HP Labs Bristol Bristol Avon England
Practical analysis tools for distributed authorization need to answer quickly and accurately the question: who can access this resource? DAP (Delegation with Acyclic Paths) is it distributed authorization framework (i... 详细信息
来源: 评论
PeerAccess: a logic for distributed authorization  05
PeerAccess: a logic for distributed authorization
收藏 引用
Proceedings of the 12th ACM conference on Computer and communications security
作者: Marianne Winslett Charles C. Zhang Piero A. Bonatti University of Illinois at Urbana-Champaign Urbana IL Università di Napoli FEDERICO II Napoli Italy
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reason about access to computational resou... 详细信息
来源: 评论
Trust but verify: authorization for web services
收藏 引用
COMPUTER SYSTEMS SCIENCE AND ENGINEERING 2006年 第5期21卷 381-392页
作者: Skalka, C. Wang, X. Sean Univ Vermont Dept Comp Sci Burlington VT 05405 USA
Through web service technology, distributed applications can be built in an open and flexible manner, bringing tremendous power to applications on the web. However, this flexibility poses significant challenges to sec... 详细信息
来源: 评论
xDomain: Cross-border Proofs of Access  09
xDomain: Cross-border Proofs of Access
收藏 引用
14th ACM Symposium on Access Control Models and Technologies
作者: Bauer, Lujo Jia, Limin Reiter, Michael K. Swasey, David Carnegie Mellon Univ Pittsburgh PA 15213 USA
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy - a technique called proof-carrying authoriz... 详细信息
来源: 评论
HCAP: A History-Based Capability System for IoT Devices  18
HCAP: A History-Based Capability System for IoT Devices
收藏 引用
23rd ACM Symposium on Access Control Models and Technologies (SACMAT)
作者: Tandon, Lakshya Fong, Philip W. L. Safavi-Naini, Reihaneh Univ Calgary Calgary AB Canada
Permissions are highly sensitive in Internet-of-Things (IoT) applications, as IoT devices collect our personal data and control the safety of our environment. Rather than simply granting permissions, further constrain... 详细信息
来源: 评论
authorization in trust management: Features and foundations
收藏 引用
ACM COMPUTING SURVEYS 2008年 第3期40卷 79-126页
作者: Chapin, Peter C. Skalka, Christian Wang, X. Sean Univ Vermont Dept Comp Sci Burlington VT 05405 USA
Trust management systems are frameworks for authorization in modern distributed systems, allowing remotely accessible resources to be protected by providers. By allowing providers to specify policy, and access request... 详细信息
来源: 评论