Filters








2,720 Hits in 4.8 sec

A Formal Analysis of the Lightweight Directory Access Protocol [chapter]

Fang Wei, Georg Lausen
2002 Lecture Notes in Computer Science  
2 Ì f Ï F  A Ä ª Ù A Â Ã Ñ V Ä i  4  0 Å m ae Ù A Â Ã Ñ V Ä i   0 Å C ç g Ù A Â~ Ñ V Ä i  w i r  0 Å G í y Ù A  & Å 7 ç Û v X ¥ 2 á  0 Å G í Ü ñ ç g ý 4 ô V ç ² Ñ V Ä i   0 Å C ç g Ù ¦ ÿà r  ...  Ä i  A Î ·  & Å 7 Ù A  0 Å Ü Ì Ù Ò Ã Ø 0 t t £ r Ñ V Ä i  A Î ·  x Ù ¥ Ù S G 6 ¦ 1 Ñ V Ä i  A Î ·  & Å 7 Ù A  0 Å ß Ì Ù Ò Ã x A t £ y Ñ d Ä Â A Î ·  x Ù ¥ Ù G 6 ¦ 1 Ñ V Ä i  A Î ·  & Å 7 Ù A  ... 
doi:10.1007/3-540-46140-x_24 fatcat:n225qmeifvdtrfc5pkvu34cyaa

RO-Crate: Describing and packaging FAIR Research Objects

Stian Soiland-Reyes, Carole Goble
2021 Zenodo  
It is based on schema.org annotations in JSON-LD, and aims to make best-practice in formal metadata description accessible and practical for use in a wide variety of situations.  ...  An RO-Crate is a structured archive of all the items that contributed to the research outcome, including their identifiers, provenance, relations and annotations.  ...  (meta)data use a formal, accessible, shared, and broadly applicable language for knowledge representation.  ... 
doi:10.5281/zenodo.4633655 fatcat:zaybndgkjne5dogr76hsaxaloy

Prototype for Extended XDB Using Wiki

Wook Sung Yoo
2012 International Journal of Database Management Systems  
The technical specification of the protocol was posted to Source Forge (sourceforge.net) and a prototype providing text-searches for Wiki was developed.  ...  This paper shows the usage of XDB on common data management in the enterprise without burdening users and application developers with unnecessary complexity and formal schemas.  ...  The user could then store the output for further analysis. DARC is a protocol that follows the Representational State Transfer (REST) architecture.  ... 
doi:10.5121/ijdms.2012.4506 fatcat:ikjgso4f7jhzlnxaxvvebfnah4

Prototype for Extended XDB Using Wiki [article]

Wook-Sung Yoo
2012 arXiv   pre-print
The technical specification of the protocol was posted to Source Forge (sourceforge.net) and a prototype providing text-searches for Wiki was developed.  ...  This paper shows the usage of XDB on common data management in the enterprise without burdening users and application developers with unnecessary complexity and formal schemas.  ...  The user could then store the output for further analysis. DARC is a protocol that follows the Representational State Transfer (REST) architecture.  ... 
arXiv:1211.5629v1 fatcat:dl7tjjutyrbglk5wrbi6zaqtvm

The DirSA case study: An introduction to software architecture technology

Vassilka D. Kirova, Howard G. Kradjel
2002 Bell Labs technical journal  
The technical contributions of Saswata Bhattacharya, Piyush Lumba, Rahim Choudhary, and Ninad Mehta, also of Lucent, were valuable in specifying the directory architecture.  ...  Acknowledgments We gratefully acknowledge Don Stewart and David Sokoler of Lucent Technologies, who lent their confident leadership and support to the directory architecture engineering and specification  ...  directory access protocol (LDAP). 16 The X.500 Directory Standard defines a number of models, operations, and protocols.  ... 
doi:10.1002/bltj.2120 fatcat:zdcrylhkqjbzdccfug7su6fdh4

Lightweight capability domains

Charles Jacobsen, Muktesh Khole, Sarah Spall, Scotty Bauer, Anton Burtsev
2015 Proceedings of the 8th Workshop on Programming Languages and Operating Systems - PLOS '15  
Furthermore, complex, semantically rich monolithic code with globally shared data structures and no explicit interfaces is not amenable to formal analysis and verification tools.  ...  We run monolithic kernels developed with a combination of an unsafe programming language, global sharing of data structures, opaque interfaces, and no explicit knowledge of kernel protocols.  ...  Acknowledgments We thank Weibin Sun, Jon Rafkind, and the anonymous PLOS reviewers.  ... 
doi:10.1145/2818302.2818307 dblp:conf/sosp/JacobsenKSBB15 fatcat:wxl2ied63rfatg6oazr7ozh7aa

Single sign on as an effective way of managing user identity in distributed web systems. The ActGo-Gate project case study / Single sign on jako efektywny sposób zarządzania tożsamością użytkowników w rozproszonych systemach internetowych na przykładzie projektu ActGo-Gate

Robert Kutera, Wiesława Gryncewicz
2016 Informatyka Ekonomiczna  
The basic concepts and presented possible solutions related to the property of Single sign on (SSO) which can provide an access to multiple connected systems after a single login have been identified.  ...  The method of selecting a specific solution that can provide SSO has been exemplified by the decision process in the ActGo-Gate project.  ...  Alternatively there is also the possibility to use user directories and their protocols such as LDAP protocol (Lightweight Directory Access Protocol) with Microsoft Active Directory (AD).  ... 
doi:10.15611/ie.2016.2.02 fatcat:m5prlhnocjdzplorikho5sbhyq

Efficient sequential consistency via conflict ordering

Changhui Lin, Vijay Nagarajan, Rajiv Gupta, Bharghava Rajaram
2012 SIGARCH Computer Architecture News  
More specifically, we identify those conflicting memory operations whose ordering is critical for the maintenance of SC and explicitly order them.  ...  This is because SC implementations that match the performance of relaxed memory models require post-retirement speculation and its associated hardware costs.  ...  /G036136/1 and the Scottish Funding Council to the University of Edinburgh.  ... 
doi:10.1145/2189750.2151006 fatcat:j6qoggrbf5ctrp7ahtzptzstre

Efficient sequential consistency via conflict ordering

Changhui Lin, Vijay Nagarajan, Rajiv Gupta, Bharghava Rajaram
2012 Proceedings of the seventeenth international conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS '12  
More specifically, we identify those conflicting memory operations whose ordering is critical for the maintenance of SC and explicitly order them.  ...  This is because SC implementations that match the performance of relaxed memory models require post-retirement speculation and its associated hardware costs.  ...  /G036136/1 and the Scottish Funding Council to the University of Edinburgh.  ... 
doi:10.1145/2150976.2151006 dblp:conf/asplos/LinNGR12 fatcat:vfbw3dnusjb2bhpa7vwbcato3q

Classification of Lightweight Directory Access Protocol query injection attacks and mitigation techniques

Pranahita Bulusu, Hossain Shahriar, Hisham M. Haddad
2015 2015 International Conference on Collaboration Technologies and Systems (CTS)  
LDAP is a popular protocol for Directory Service. Data objects are represented in hierarchical form.  ...  Abstract LDAP is a popular protocol for Directory Service. Data objects are represented in hierarchical form.  ...  Classification of Lightweight Directory Access Protocol Query Injection Attacks and Mitigation Techniques Abstract LDAP is a directory access protocol commonly used in web applications to provide lookup  ... 
doi:10.1109/cts.2015.7210446 dblp:conf/cts/BulusuSH15 fatcat:p252savu2zb5jbo5trbxsqmaoq

Using Semantics for Automating the Authentication of Web APIs [chapter]

Maria Maleshkova, Carlos Pedrinaci, John Domingue, Guillermo Alvaro, Ivan Martinez
2010 Lecture Notes in Computer Science  
We present a thorough analysis carried out over a body of publicly available APIs that determines the most commonly used authentication approaches.  ...  We evaluate the applicability of our approach by providing a prototypical implementation, which uses authentication annotations as the basis for automated service invocation.  ...  The work presented in this paper is partially supported by EU funding under the project SOA4All (FP7 -215219).  ... 
doi:10.1007/978-3-642-17746-0_34 fatcat:6rtdzqp3ovh53a6peqlys7ngp4

Hadoop Security Challenges and Its Solution Using KNOX

Sirisha N, Kiran K V D, R Karthik
2018 Indonesian Journal of Electrical Engineering and Computer Science  
Big data also formally introduces a complex range of analysis. Big data can evaluate mixed data (structured and unstructured) from multiple sources.  ...  <p>Big Data is a new technology and architecture. It can work on a very large volume of a variety of data with high-velocity, discovery, and/or analysis.  ...  It is designed to integrate with Kerberos & LDAP (Lightweight Directory Access Protocol) to handle authentication services [25] [26] [27] . A Knox"ified Hadoop is shown in Figure 2 .  ... 
doi:10.11591/ijeecs.v12.i1.pp107-116 fatcat:f6fteppgmnd2tnlqwixs4w5a3a

AN ANALYSIS OF CONTEXT-AWARE DATA MODELS FOR SMART CITIES: TOWARDS FIWARE AND ETSI CIM EMERGING DATA MODEL

A. J. Jara, Y. Bocchi, D. Fernandez, G. Molina, A. Gomez
2017 The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences  
For that reason, a data model that offers advanced capabilities for the description of context is required.  ...  Smart Cities requires the support of context-aware and enriched semantic descriptions to support a scalable and cross-domain development of smart applications.  ...  ACKNOWLEDGMENTS This work has been sponsored by HES-SO University; the scholarship (Industrial Doctorate) by UCAM; and the collaboration with SmartSDK (723174) project.  ... 
doi:10.5194/isprs-archives-xlii-4-w3-43-2017 fatcat:awrabggtifd7nhrjxznmw6rjbm

Topaz: Extending Firefox to Accommodate the GridFTP Protocol

Richard Zamudio, Daniel Catarino, Michela Taufer, Brent Stearn, Karan Bhatia
2007 2007 IEEE International Parallel and Distributed Processing Symposium  
The Mozilla framework provides much of the infrastructure to build rich end-user applications, but lacks the capability to integrate with Grid protocols and APIs.  ...  In this paper we present the design and evaluation of Topaz, a Mozilla-based component that provides GridFTP functionality to the popular Firefox browser.  ...  However, from the desktop (which is outside of the formal grid) the end-user must employ different protocols to upload the data to a repository.  ... 
doi:10.1109/ipdps.2007.370549 dblp:conf/ipps/ZamudioCTSB07 fatcat:hftep7qzmbac5hch3tffkrig5e

Delivering Live Multimedia Streams to Mobile Hosts in a Wireless Internet with Multiple Content Aggregators

Cristian Hesselman, Henk Eertink, Ing Widya, Erik Huizer
2005 Journal on spesial topics in mobile networks and applications  
As part of the system, we discuss a lightweight application-level protocol that enables mobile hosts to select the aggregator that provides the 'best' configuration of a channel.  ...  The protocol comes into play when a mobile host begins to receive a channel and when it crosses a subnet boundary while receiving the channel.  ...  Acknowledgments The authors thank Hans Zandbelt, Remco Poortinga, and Arjan Peddemors (Telematica Instituut) for helping out with the implementation and the test environment.  ... 
doi:10.1007/s11036-005-6426-0 fatcat:w76vuw3hpbc7rmmwuvntf2tdoe
« Previous Showing results 1 — 15 out of 2,720 results