Filters








174,367 Hits in 5.1 sec

Access Control List Mediation System for Large-Scale Network

Kanghee Lee, Zhefan Jiang, Sangok Kim, Sangwook Kim, Sunkyung Kim
2005 Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05)  
Access control list mediation system selects or adapts the most important policy among colliding policies through a policy importance valuation.  ...  Large-Scale network such as the Internet consist of a large number of sub-networks.  ...  Access Control List Mediation System Architecture A large-scale network consists of a lot of subnetworks, and each sub-network includes smaller subnetworks.  ... 
doi:10.1109/pdcat.2005.59 dblp:conf/pdcat/LeeJKKK05 fatcat:x35nu56vyrhlbaen63j6u5eio4

Requirements for scalable access control and security management architectures

Angelos D. Keromytis, Jonathan M. Smith
2007 ACM Transactions on Internet Technology  
In this paper we discuss scalability challenges for traditional access control mechanisms at the architectural level, and present a set of fundamental requirements for authorization services in large-scale  ...  With this paper, we hope to influence the design of future access-control systems towards more decentralized and scalable mechanisms.  ...  Approved for Public Release, Distribution Unlimited.  ... 
doi:10.1145/1239971.1239972 fatcat:y4qamkb24jcslmbtm6topumm6e

Challenges in Large-Scale Open Agent Mediated Economies [chapter]

Steven Willmott, Monique Calisti, Emma Rollon
2002 Lecture Notes in Computer Science  
Large-scale usage of these technologies would very likely lead to environments which have many of the features commonly considered in Agent mediated e-commerce research: large-scale, dynamic populations  ...  This paper discusses the possibility of developing a large-scale open, agent based "economy" to act as a challenging test environment for electronic commerce solutions based on agent technology.  ...  The paper is intended to be primarily discursive to stimulate discussion on the feasibility and utility of developing support for a large-scale open agent mediated economy.  ... 
doi:10.1007/3-540-36378-5_20 fatcat:n7p2ngrjh5abzapvq6zpqgql7q

Object-Capability Security in Virtual Environments

Martin Scheffler, Jan P. Springer, Bernd Froehlich
2008 2008 IEEE Virtual Reality Conference  
We describe our experiences in the application of the object-capability model for access control to object-manipulation tasks common to collaborative virtual environments.  ...  Access control is an important aspect of shared virtual environments.  ...  ACKNOWLEDGMENTS We thank Mark Miller, Kevin Reid, and the ERights community for discussion and constructive feedback on earlier drafts.  ... 
doi:10.1109/vr.2008.4480750 dblp:conf/vr/SchefflerSF08 fatcat:mrc5s3ilmbbnvopldkz3dpfleq

Design of a patient-centered, multi-institutional healthcare information network using peer-to-peer communication in a highly distributed architecture

Antoine Geissbuhler, Stéphane Spahni, André Assimacopoulos, Marc-André Raetzo, Gérard Gobet
2004 Studies in Health Technology and Informatics  
Access control can be managed by the patient with the help of a medical information mediator, the physician of trust.  ...  and validate key components of the network, including its technical architecture and the strategy for the management of access rights by the patients. a distributed architecture using peer-to-peer communication  ...  As illustrated in Figure 1 , only two databases are centralized: the list of healthcare professionals and their access rights, and the list of all "mediators" on the network.  ... 
pmid:15360972 fatcat:hpm354hoyvg3zgeic5fvjrbj7i

Page 171 of Behavior Research Methods Vol. 17, Issue 2 [page]

1985 Behavior Research Methods  
CONCLUSION The multinetwork Apple H/FIRST system constitutes a powerful multiuser facility for experimental control, large-scale data acquisition, sophisticated data process¬ ing, and long-term data storage  ...  SOFTWARE ENHANCEMENT The successive stages of hardware development in the evolution of our networks were undertaken principally to address limitations imposed by the floppy disk system on the large-scale  ... 

Standards-based network monitoring for the grid

J. Nowell, K. Kavoussanakis, C. Palansuriya, M. Piotrowski, F. Scharinger, P. Graham, B. Dobrzelecki, A. Trew
2009 Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences  
In this paper, the design and implementation of a set of tools for providing access to federated network monitoring data are presented, based on standards developed within the Open Grid Forum Network Measurements  ...  These tools give access to data collected by heterogeneous, NM-WG compliant network monitoring tools.  ...  We would like to thank the perfSONAR partners, especially DANTE (GÉANT2) for providing us with access to perfSONAR measurement archives and data.  ... 
doi:10.1098/rsta.2009.0033 pmid:19451105 fatcat:z7pp72nrjbearptntg7m2uxvzm

Arachne: Integrated Enterprise Security Management

Matthew Burnside, Angelos D. Keromytis
2007 2007 IEEE SMC Information Assurance and Security Workshop  
Furthermore, access-control mechanisms operate independently on each service, which often leads to inconsistent or incorrect application of the intended system-wide policy.  ...  To begin to solve these problems, we propose a new system for defense-in-depth using global security policies.  ...  Government to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon.  ... 
doi:10.1109/iaw.2007.381935 fatcat:neuoktzoxra5tpw3buu4aaqpiu

Distributed services for information dissemination in self-organizing sensor networks

Alvin Lim
2001 Journal of the Franklin Institute  
Dynamic enterprise systems, such as the battlefield, use self-organizing sensor network infrastructure to gather and disseminate real-time information for controlling the enterprise.  ...  These sensor nodes network in an ad-hoc way, with little or no fixed network support, to provide the surveillance and targeting information for dynamic control of the enterprise.  ...  Acknowledgements This research is supported in part by the Space and Naval Warfare Systems Center, Department of Navy.  ... 
doi:10.1016/s0016-0032(01)00020-5 fatcat:ffl43uthjvgwvp7xnanew4cp3i

Ravel

Anduo Wang, Xueyuan Mei, Jason Croft, Matthew Caesar, Brighten Godfrey
2016 Proceedings of the Symposium on SDN Research - SOSR '16  
While this is an ambitious long-term goal, our prototype built on the PostgreSQL database exhibits promising performance even for large scale networks.  ...  SDN's logically centralized control provides an insertion point for programming the network.  ...  A prototype built on the PostgreSQL database exhibits promising performance even for large scale networks.  ... 
doi:10.1145/2890955.2890970 dblp:conf/sosr/WangMCCG16 fatcat:mbnlu5mlwbd3beorrkyjq6upsy

JaCoWeb Security - A CORBA Security Discretionary Prototype

Carla Merkle Westphall, Joni Da Silva Fraga, Michelle Silva Wangham, Lau C. Lung
2000 CLEI Electronic Journal  
JaCoWeb Security Project is developing an authorization scheme for large-scale networks that is based on structures and concepts introduced in Web, Java and CORBA for security.  ...  This scheme is being developed in order to deal with management of security policies in large-scale networks simplifying authorization policy implementation.  ...  distributed applications in large-scale networks.  ... 
doi:10.19153/cleiej.3.2.2 fatcat:4pkjohh7mfakfk4ynyeaqbiaea

Gene Prioritization for Imaging Genetics Studies Using Gene Ontology and a Stratified False Discovery Rate Approach

Sejal Patel, Min Tae M. Park, M. Mallar Chakravarty, Jo Knight
2016 Frontiers in Neuroinformatics  
Our approach demonstrates a potential method to prioritize genes based on biological systems impaired in a disease.  ...  The main obstacle for researchers in the field is the high dimensionality of the data in both the imaging phenotypes and the genetic variants commonly typed.  ...  The SCC is funded by: The Canada Foundation for Innovation, Research Hospital Fund.  ... 
doi:10.3389/fninf.2016.00014 pmid:27092072 pmcid:PMC4823264 fatcat:jxe5m3crzbbvvj3fswwd62r2xy

An Internet-mediated process control laboratory

2003 IEEE Control Systems  
Studies have shown that network speeds are not a significant concern for these systems due to slow process dynamics.  ...  Two laboratory-scale experiments have been developed that can be executed safely over the Internet. Remote access is within a client-server paradigm.  ...  We also wish to thank Steve Picker for fabricating the experimental setups.  ... 
doi:10.1109/mcs.2003.1172825 fatcat:dw7pw7smyzabjjva4i6k6a26ti

Augmented Virtual Reality: Combining Crowd Sensing and Social Data Mining with Large-Scale Simulation Using Mobile Agents for Future Smart Cities

Stefan Bosse, Uwe Engel
2019 Proceedings (MDPI)  
Augmented reality is well known for extending the real world by adding computer-generated perceptual information and overlaid sensory information.  ...  In this work, a new concept and framework for augmented virtual reality simulation is introduced, suitable for, but not limited to, the investigation of large-scale socio-technical systems.  ...  , large-scale social media interaction, Crowd Sensing, and many more complex systems with unknown emergence behavior.  ... 
doi:10.3390/ecsa-5-05762 fatcat:4ivcqteugrhqpfqmrihe63c4vi

BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs [article]

Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen
2018 arXiv   pre-print
The BlendCAC aims at an effective access control processes to devices, services and information in large scale IoT systems.  ...  Based on the blockchain network, a capability delegation mechanism is suggested for access permission propagation.  ...  large scale distributed IoT networks.  ... 
arXiv:1804.09267v1 fatcat:gybholdhv5c4hktfhuzpmbjrcy
« Previous Showing results 1 — 15 out of 174,367 results