咨询与建议

限定检索结果

文献类型

  • 8 篇 期刊文献
  • 5 篇 会议

馆藏范围

  • 13 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12 篇 工学
    • 10 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 3 篇 信息与通信工程
    • 3 篇 软件工程
    • 2 篇 控制科学与工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 网络空间安全
  • 1 篇 理学
    • 1 篇 数学

主题

  • 13 篇 distributed auth...
  • 4 篇 access control
  • 3 篇 trust management
  • 2 篇 security
  • 1 篇 internet of thin...
  • 1 篇 generic design p...
  • 1 篇 lagrange interpo...
  • 1 篇 world wide web
  • 1 篇 languages
  • 1 篇 data processing
  • 1 篇 safety
  • 1 篇 ecosystems
  • 1 篇 superconducting ...
  • 1 篇 health care equi...
  • 1 篇 outsourcing data...
  • 1 篇 logic gates
  • 1 篇 nonmonotonic rea...
  • 1 篇 hospitals
  • 1 篇 trading
  • 1 篇 commerce

机构

  • 2 篇 univ vermont dep...
  • 1 篇 arab acad sci te...
  • 1 篇 school of softwa...
  • 1 篇 tech univ berlin...
  • 1 篇 king saud univ c...
  • 1 篇 menoufia univ fa...
  • 1 篇 university of il...
  • 1 篇 univ vermont bur...
  • 1 篇 ucl dept informa...
  • 1 篇 hp labs bristol ...
  • 1 篇 univ calgary cal...
  • 1 篇 univ petr & ener...
  • 1 篇 carnegie mellon ...
  • 1 篇 forth inst comp ...
  • 1 篇 department of co...
  • 1 篇 world wide web c...
  • 1 篇 school of comput...
  • 1 篇 università di na...

作者

  • 2 篇 wang x. sean
  • 2 篇 skalka christian
  • 1 篇 thatmann dirk
  • 1 篇 wang lie
  • 1 篇 marianne winslet...
  • 1 篇 sinha keshav
  • 1 篇 lain antonio
  • 1 篇 chapin peter
  • 1 篇 skalka c.
  • 1 篇 bauer lujo
  • 1 篇 wang x.
  • 1 篇 chapin peter c.
  • 1 篇 swasey david
  • 1 篇 piero a. bonatti
  • 1 篇 zhang huanguo
  • 1 篇 zhang lan
  • 1 篇 genitsaridi irin...
  • 1 篇 charles c. zhang
  • 1 篇 reiter michael k...
  • 1 篇 aly moustafa h.

语言

  • 10 篇 英文
  • 1 篇 法文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=distributed authorization"
13 条 记 录,以下是1-10 订阅
distributed authorization in Complex Multi Entity-Driven API Ecosystems  8
Distributed Authorization in Complex Multi Entity-Driven API...
收藏 引用
8th International Conference on Signal Processing and Communication Systems, (ICSPCS)
作者: Thatmann, Dirk Tech Univ Berlin Telekom Innovat Labs Serv Ctr Networking SNET D-10587 Berlin Germany
In certain business sectors adapting to modern and cost reducing technologies and service models can be still a challenge. This especially applies for health care related SME, such as hospitals, where cost reduction r... 详细信息
来源: 评论
WDAI: a simple World Wide Web distributed authorization infrastructure
收藏 引用
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING 1999年 第11-16期31卷 1599-1609页
作者: Kahan, J World Wide Web Consortium W3C INRIA F-38330 Montbonnot St Martin France
The World Wide Web (W3) has the potential to link different kinds of documents into hypertext collections and to distribute such collections among many document servers. distributed collections can bring forth new W3 ... 详细信息
来源: 评论
Risk management for distributed authorization
收藏 引用
JOURNAL OF COMPUTER SECURITY 2007年 第4期15卷 447-489页
作者: Skalka, Christian Wang, X. Chapin, Peter Univ Vermont Burlington VT USA
distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all assertions as equally valid up to certifica... 详细信息
来源: 评论
DEAL: A distributed authorization Language for Ambient Intelligence
收藏 引用
INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE 2011年 第4期3卷 9-24页
作者: Genitsaridi, Irini Bikakis, Antonis Antoniou, Grigoris FORTH Inst Comp Sci Informat Syst Lab Iraklion Greece UCL Dept Informat Studies London England
authorization is an open problem in Ambient Intelligence environments. The difficulty of implementing authorization policies lies in the open and dynamic nature of such environments. The information is distributed amo... 详细信息
来源: 评论
Dominator-Tree Analysis for distributed authorization
Dominator-Tree Analysis for Distributed Authorization
收藏 引用
3rd ACM SIGPLAN Workshop on Programming Languages and Analysis for Security
作者: Mowbray, Miranda Lain, Antonio HP Labs Bristol Bristol Avon England
Practical analysis tools for distributed authorization need to answer quickly and accurately the question: who can access this resource? DAP (Delegation with Acyclic Paths) is it distributed authorization framework (i... 详细信息
来源: 评论
PeerAccess: a logic for distributed authorization  05
PeerAccess: a logic for distributed authorization
收藏 引用
Proceedings of the 12th ACM conference on Computer and communications security
作者: Marianne Winslett Charles C. Zhang Piero A. Bonatti University of Illinois at Urbana-Champaign Urbana IL Università di Napoli FEDERICO II Napoli Italy
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reason about access to computational resou... 详细信息
来源: 评论
Enhancing Cloud Data Security Through Functional-Based Stream Cipher and Attribute-Based Access Control with Multiparty authorization
收藏 引用
TRAITEMENT DU SIGNAL 2025年 第2期42卷 915-931页
作者: Sinha, Keshav Aldosary, Saad Aly, Moustafa H. El-Shafai, Walid Univ Petr & Energy Studies Sch Comp Sci Dehra Dun 248007 India King Saud Univ Community Coll Dept Comp Sci Riyadh 11437 Saudi Arabia Arab Acad Sci Technol & Maritime Transport Coll Engn & Technol Elect & Commun Engn Dept Alexandria 1029 Egypt Menoufia Univ Fac Elect Engn Dept Elect & Elect Commun Engn Menoufia 32952 Egypt
In the present-day context, data owners store and share sensitive records on cloud servers to ensure the confidentiality and integrity of their data. There are challenges related to storing data on cloud servers, incl... 详细信息
来源: 评论
Trust but verify: authorization for web services
收藏 引用
COMPUTER SYSTEMS SCIENCE AND ENGINEERING 2006年 第5期21卷 381-392页
作者: Skalka, C. Wang, X. Sean Univ Vermont Dept Comp Sci Burlington VT 05405 USA
Through web service technology, distributed applications can be built in an open and flexible manner, bringing tremendous power to applications on the web. However, this flexibility poses significant challenges to sec... 详细信息
来源: 评论
xDomain: Cross-border Proofs of Access  09
xDomain: Cross-border Proofs of Access
收藏 引用
14th ACM Symposium on Access Control Models and Technologies
作者: Bauer, Lujo Jia, Limin Reiter, Michael K. Swasey, David Carnegie Mellon Univ Pittsburgh PA 15213 USA
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy - a technique called proof-carrying authoriz... 详细信息
来源: 评论
HCAP: A History-Based Capability System for IoT Devices  18
HCAP: A History-Based Capability System for IoT Devices
收藏 引用
23rd ACM Symposium on Access Control Models and Technologies (SACMAT)
作者: Tandon, Lakshya Fong, Philip W. L. Safavi-Naini, Reihaneh Univ Calgary Calgary AB Canada
Permissions are highly sensitive in Internet-of-Things (IoT) applications, as IoT devices collect our personal data and control the safety of our environment. Rather than simply granting permissions, further constrain... 详细信息
来源: 评论