-
1
-
-
84942356096
-
A practical distributed authorization system for GARA
-
Center for Information Technology Integration, University of Michigan
-
W. Adamson and O. Kornievskaia. A Practical Distributed Authorization System for GARA. Technical Report 01-14, Center for Information Technology Integration, University of Michigan, 2001.
-
(2001)
Technical Report 01-14
-
-
Adamson, W.1
Kornievskaia, O.2
-
2
-
-
84957800809
-
Keynote: Trust management for public-key infrastructures
-
Springer LNCS
-
M. Blaze, J. Feigenbaum, and A. D. Keromytis. KeyNote: Trust Management for Public-Key Infrastructures. In Security Protocols International Workshop, volume 1550, pages 59-63. Springer LNCS, 1998.
-
(1998)
Security Protocols International Workshop
, vol.1550
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
3
-
-
84958048748
-
Compliance checking in the policymaker trust management system
-
M. Blaze, J. Feigenbaum, and M. Strauss. Compliance checking in the policymaker trust management system. In Financial Cryptography, pages 254-274, 1998.
-
(1998)
Financial Cryptography
, pp. 254-274
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
4
-
-
12444294228
-
Active streams: An approach to adaptive distributed systems
-
F. Bustamante and K. Schwan. Active Streams: An Approach to Adaptive Distributed Systems. In HotOS, 2001.
-
(2001)
HotOS
-
-
Bustamante, F.1
Schwan, K.2
-
5
-
-
84942356097
-
DRBAC: Distributed role-based access control for dynamic coalition environments
-
E. Freudenthal et al. dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments. In ICDCS, 2001.
-
(2001)
ICDCS
-
-
Freudenthal, E.1
-
6
-
-
84942356098
-
Switchboard: Secure, monitored connections for client-server communication
-
E. Freudenthal et al. Switchboard: Secure, Monitored Connections for Client-Server Communication. In RESH, 2002.
-
(2002)
RESH
-
-
Freudenthal, E.1
-
7
-
-
84942356099
-
Spki certificate theory, rfc 2693
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. Spki certificate theory, rfc 2693. In Network Working Group, The Internet Society, 1999.
-
(1999)
Network Working Group, The Internet Society
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
8
-
-
84956859986
-
A flexible security system for metacomputing environments
-
A. Ferrari, F. Knabe, M. Humphrey, S. Chapin, and A. Grimshaw. A Flexible Security System for Metacomputing Environments. In HPCN, pages 370-380, 1999.
-
(1999)
HPCN
, pp. 370-380
-
-
Ferrari, A.1
Knabe, F.2
Humphrey, M.3
Chapin, S.4
Grimshaw, A.5
-
10
-
-
0032218229
-
A security architecture for computational grids
-
I. T. Foster, C. Kesselman, G. Tsudik, and S. Tuecke. A security architecture for computational grids. In ACM CCS, pages 83-92, 1998.
-
(1998)
ACM CCS
, pp. 83-92
-
-
Foster, I.T.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
12
-
-
84945272430
-
CANS: Composable, adaptive network services infrastructure
-
X. Fu, W. Shi, A. Akkerman, and V. Karamcheti. CANS: Composable, Adaptive Network Services Infrastructure. USITS, 2001.
-
(2001)
USITS
-
-
Fu, X.1
Shi, W.2
Akkerman, A.3
Karamcheti, V.4
-
13
-
-
0003313661
-
Java security: Present and near future
-
L. Gong. Java security: present and near future. IEEE Micro, 17(3):14-19, 1997.
-
(1997)
IEEE Micro
, vol.17
, Issue.3
, pp. 14-19
-
-
Gong, L.1
-
14
-
-
0032625454
-
Wide-area computing: Resource sharing on a large scale
-
A. Grimshaw, A. Ferrari, F. Knabe, and M. Humphrey. Wide-Area Computing: Resource Sharing on a Large Scale. Computer, 32(5):29-37, 1999.
-
(1999)
Computer
, vol.32
, Issue.5
, pp. 29-37
-
-
Grimshaw, A.1
Ferrari, A.2
Knabe, F.3
Humphrey, M.4
-
16
-
-
84949192371
-
Partitionable services: A framework for seamlessly adapting distributed applications to heterogenous environments
-
A. Ivan, J. Harman, M. Allen, and V. Karamcheti. Partitionable Services: A Framework for Seamlessly Adapting Distributed Applications to Heterogenous Environments. In HPDC, 2002.
-
(2002)
HPDC
-
-
Ivan, A.1
Harman, J.2
Allen, M.3
Karamcheti, V.4
-
18
-
-
84947218130
-
Constrained component deployment in wide-area networks using AI planning techniques
-
T. Kichkaylo, A. Ivan, and V. Karamcheti. Constrained Component Deployment in Wide-Area Networks Using AI Planning Techniques. In IPDPS, 2003.
-
(2003)
IPDPS
-
-
Kichkaylo, T.1
Ivan, A.2
Karamcheti, V.3
-
20
-
-
84969377247
-
User authentication and authorization in the Java platform
-
IEEE Computer Society Press
-
C. Lai, L. Gong, L. Koved, A. Nadalin, and R. Schemers. User authentication and authorization in the Java platform. In 15th Annual Computer Security Applications Conference, pages 285-290. IEEE Computer Society Press, 1999.
-
(1999)
15th Annual Computer Security Applications Conference
, pp. 285-290
-
-
Lai, C.1
Gong, L.2
Koved, L.3
Nadalin, A.4
Schemers, R.5
-
22
-
-
17144404242
-
Object views: Language support for intelligent object caching in parallel and distributed computations
-
I. Lipkind, I. Pechtchanski, and V. Karamcheti. Object Views: Language Support for Intelligent Object Caching in Parallel and Distributed Computations. In OOPSLA, pages 447-460, 1999.
-
(1999)
OOPSLA
, pp. 447-460
-
-
Lipkind, I.1
Pechtchanski, I.2
Karamcheti, V.3
-
23
-
-
12444319716
-
Support for interactive heavyweight services
-
J. Lopez and D. O'Hallaron. Support for Interactive Heavyweight Services. In HPDC, 2001.
-
(2001)
HPDC
-
-
Lopez, J.1
O'Hallaron, D.2
-
25
-
-
12444335060
-
-
Object Management Group. CORBA Component Model. http://www.omg.org/, 2003.
-
(2003)
CORBA Component Model
-
-
-
26
-
-
0034502932
-
A national-scale authentication infrastructure
-
R. Butler et al. A National-Scale Authentication Infrastructure. IEEE Computer, 33(12):60-66, 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.12
, pp. 60-66
-
-
Butler, R.1
-
28
-
-
85094635733
-
An architecture for a secure service discovery service
-
S. Czerwinski et al. An architecture for a secure service discovery service. In Mobile Computing and Networking, pages 24-35, 1999.
-
(1999)
Mobile Computing and Networking
, pp. 24-35
-
-
Czerwinski, S.1
-
32
-
-
3342902457
-
A new model of security for distributed systems
-
CS Department, University of Virginia
-
W. Wulf, C. Wang, and D. Kienzle. A New Model of Security for Distributed Systems. Technical Report CS-95-34, CS Department, University of Virginia, 1995.
-
(1995)
Technical Report CS-95-34
-
-
Wulf, W.1
Wang, C.2
Kienzle, D.3
-
33
-
-
84981249592
-
Eager handlers - Communication optimization in Java-based distributed applications with reconfigurable fine-grained code migration
-
D. Zhou and K. Schwan. Eager Handlers - Communication Optimization in Java-based Distributed Applications with Reconfigurable Fine-grained Code Migration. 3rd Intl. Workshop on Java for Parallel and Distributed Computing, 2001.
-
(2001)
3rd Intl. Workshop on Java for Parallel and Distributed Computing
-
-
Zhou, D.1
Schwan, K.2
-
34
-
-
0032629460
-
A user-centered, modular authorization service built on an RBAC foundation
-
M. E. Zurko, R. Simon, and T. Sanfilippo. A User-Centered, Modular Authorization Service Built on an RBAC Foundation. In IEEE Symposium on Security and Privacy, pages 57-71, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 57-71
-
-
Zurko, M.E.1
Simon, R.2
Sanfilippo, T.3
|