Filters








5,826 Hits in 3.0 sec

Authentication in the Taos operating system

Edward Wobber, Martín Abadi, Michael Burrows, Butler Lampson
1994 ACM Transactions on Computer Systems  
It is critical for performance that the results of Authenticate be cached. Caching can be implemented in us.. space, in the operating system, or both.  ...  In each node, a new operating system component called the authentication agent manages compound principals and their credentials.  ...  Therefore, by the monotonicity of as, M( x.k _ as) implies (Q(x.prin) as x.role) = (P(x.prin) as x.role), that is, Q(x) = P(x). Finally, M(x) implies M(x.k_as), and hence Q(x) = P( x).  ... 
doi:10.1145/174613.174614 fatcat:pwabc74hjbhpjllzevon2pishe

Authentication in the Taos operating system

Edward Wobber, Martín Abadi, Michael Burrows, Butler Lampson
1993 ACM SIGOPS Operating Systems Review  
It is critical for performance that the results of Authenticate be cached. Caching can be implemented in us.. space, in the operating system, or both.  ...  In each node, a new operating system component called the authentication agent manages compound principals and their credentials.  ...  Therefore, by the monotonicity of as, M( x.k _ as) implies (Q(x.prin) as x.role) = (P(x.prin) as x.role), that is, Q(x) = P(x). Finally, M(x) implies M(x.k_as), and hence Q(x) = P( x).  ... 
doi:10.1145/173668.168640 fatcat:xrziuuw54zbjhesb3qbph34npu

Authentication in the Taos operating system

Edward Wobber, Martín Abadi, Michael Burrows, Butler Lampson
1993 Proceedings of the fourteenth ACM symposium on Operating systems principles - SOSP '93  
It is critical for performance that the results of Authenticate be cached. Caching can be implemented in us.. space, in the operating system, or both.  ...  In each node, a new operating system component called the authentication agent manages compound principals and their credentials.  ...  Therefore, by the monotonicity of as, M( x.k _ as) implies (Q(x.prin) as x.role) = (P(x.prin) as x.role), that is, Q(x) = P(x). Finally, M(x) implies M(x.k_as), and hence Q(x) = P( x).  ... 
doi:10.1145/168619.168640 dblp:conf/sosp/WobberABL93 fatcat:yx3bdyu53bbdpm7lw5eflljjlu

Combining Cloud and Grid with a User Interface [chapter]

Jiaqi Zhao, Jie Tao, Mathias Stuempert, Moritz Post
2010 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
grid in a simple way File transfer: drag&drop Job submission: mouse click (Re-)use Eclipse and contributeEclipse is an eco system Eclipse is an eco system Build for extension More than a JAVA IDE The  ...  Developer In general...  ... 
doi:10.1007/978-3-642-12636-9_8 fatcat:xsd5wwk4ffa2tfvaoyohcskz4u

Time cost evaluation for executing RFID authentication protocols

Kevin Chiew, Yingjiu Li, Tieyan Li, Robert H. Deng, Manfred Aigner
2010 2010 Internet of Things (IOT)  
There are various reader/tag authentication protocols proposed for the security of RFID systems.  ...  several choices of cryptographic operations in an application. 46 49 52  ...  authenticate themselves to readers, referred to as TAO (tag authentication only) as shown in Figure 2(b) .  ... 
doi:10.1109/iot.2010.5678437 dblp:conf/iot/ChiewLLDA10 fatcat:yehap557h5atzedw432nntly2e

Proof-carrying authentication

Andrew W. Appel, Edward W. Felten
1999 Proceedings of the 6th ACM conference on Computer and communications security - CCS '99  
We show that by starting with the logic, we can implement these frameworks, all in the same concise and efficient system.  ...  Authentication frameworks -including Taos, SPKI, SDSI, and X.509 -have been explained using logic.  ...  Formal logic has been used successfully to explain authentication frameworks and protocols, most notably in the design of the Taos distributed operating system [1, 6] .  ... 
doi:10.1145/319709.319718 dblp:conf/ccs/AppelF99 fatcat:khbnqnoa5zerjnm3wggswxo6h4

GriT: a CORBA-based grid middleware architecture

A.S. Gokhale, B. Natarajan
2003 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the  
First, we describe how we are utilizing the standards-based CORBA distributed object computing and integration technology to design the next generation Grid middleware, called Grid TAO (GriT) that complements  ...  Rapid advances in networking, hardware, and middleware technologies are facilitating the development and deployment of Grid applications, which are characterized by their very high computing and resource  ...  Middleware is reusable software that resides between the applications and the underlying operating systems, network protocol stacks, and hardware [24] .  ... 
doi:10.1109/hicss.2003.1174882 dblp:conf/hicss/GokhaleN03 fatcat:xbghrqipofgkrcnv7xt5bhn3g4

Smartphone-based traffic information system for sustainable cities

V. Manolopoulos, S. Tao, A. Rusu, P. Papadimitratos
2013 ACM SIGMOBILE Mobile Computing and Communications Review  
to protect the TIS, (iii) does so in a privacy preserving manner; and our system achieves (ii) and (iii) by extending the existing 3G cellular authentication architecture.  ...  Smartphone-based Traffic Information System Towards a fully operational system of this type, a number of issues must be addressed [1], notably: (i) security and privacy, and (ii) processing of the collected  ...  securely to protect the TIS, (iii) does so in a privacy preserving manner; and our system achieves (ii) and (iii) by extending the existing 3G cellular authentication architecture.  ... 
doi:10.1145/2436196.2436213 fatcat:5xo3tsf5frgerisw5kaq4hsgxy

Authentication in distributed systems: theory and practice

Butler Lampson, Martín Abadi, Michael Burrows, Edward Wobber
1992 ACM Transactions on Computer Systems  
ACKNOWLEDGEMENTS Many of the ideas discussed  ...  -An agent in the operating system can optimize the common case of authentication between two processes on the same node.  ...  The basic structure of agents, authentication identifiers, authorities, and ACLS is in place, Our operating system and distributed file system are both clients of our authentication and access control.  ... 
doi:10.1145/138873.138874 fatcat:2y4blkuz7vf75ghsq6hcb5us6m

Decentralized user authentication in a global file system

Michael Kaminsky, George Savvides, David Mazieres, M. Frans Kaashoek
2003 Proceedings of the nineteenth ACM symposium on Operating systems principles - SOSP '03  
An implementation of the authentication server and a file server supporting access control lists demonstrate the viability of this design in the context of the Self-certifying File System (SFS).  ...  The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming any kind of pre-existing  ...  This research was supported by the Defense Advanced Research Projects Agency (DARPA) and the Space and Naval Warfare Systems Center, San Diego, under contract #N66001-01-1-8927, and MIT Project Oxygen.  ... 
doi:10.1145/945445.945452 dblp:conf/sosp/KaminskySMK03 fatcat:xkyioack5jcgpae2kyld2sdm7m

Decentralized user authentication in a global file system

Michael Kaminsky, George Savvides, David Mazieres, M. Frans Kaashoek
2003 ACM SIGOPS Operating Systems Review  
An implementation of the authentication server and a file server supporting access control lists demonstrate the viability of this design in the context of the Self-certifying File System (SFS).  ...  The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming any kind of pre-existing  ...  This research was supported by the Defense Advanced Research Projects Agency (DARPA) and the Space and Naval Warfare Systems Center, San Diego, under contract #N66001-01-1-8927, and MIT Project Oxygen.  ... 
doi:10.1145/1165389.945452 fatcat:cwupjqtrazgdzkxjydnd57y3au

Decentralized user authentication in a global file system

Michael Kaminsky, George Savvides, David Mazieres, M. Frans Kaashoek
2003 Proceedings of the nineteenth ACM symposium on Operating systems principles - SOSP '03  
An implementation of the authentication server and a file server supporting access control lists demonstrate the viability of this design in the context of the Self-certifying File System (SFS).  ...  The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming any kind of pre-existing  ...  This research was supported by the Defense Advanced Research Projects Agency (DARPA) and the Space and Naval Warfare Systems Center, San Diego, under contract #N66001-01-1-8927, and MIT Project Oxygen.  ... 
doi:10.1145/945449.945452 fatcat:7bvpurlc2zbuhokc2r5vpgpgwe

An IoT Middleware Framework for Industrial Applications

Nicoleta-Cristina Gaitan, Vasile Gheorghita, Ioan Ungurean
2016 International Journal of Advanced Computer Science and Applications  
The framework is modular, allowing the easy integration of new fieldbus protocols, middleware technologies and new objects in the client application.  ...  The implementation of IoT in the industrial environment raises some significant issues related to the diversity of fieldbuses, the large number of devices and their configuration.  ...  ACKNOWLEDGMENT This work was partially supported from the project "Integrated Centre for research, development and innovation in Advanced Materials, Nanotechnologies, and Distributed Systems for fabrication  ... 
doi:10.14569/ijacsa.2016.070905 fatcat:zkmw7ywa3fcfpaik55cc3ebovy

Fusion of biometric systems using Boolean combination: an application to iris-based authentication

Eric Granger, Wael Khreich, Robert Sabourin, Dmitry O. Gorodnichy
2012 International Journal of Biometrics (IJBM)  
Performance of IBC is assessed for biometric authentication applications in which the operational response of unimodal iris-base systems are combined.  ...  To improve accuracy and reliability, Boolean combination (BC) can efficiently integrate the responses of multiple biometric systems in the ROC space.  ...  Acknowledgements This research was supported in part by the Natural Sciences and Engineering Research Council of Canada.  ... 
doi:10.1504/ijbm.2012.047645 fatcat:ksxcpamu3bfdhi2yjv7n47b7yu

Fast Authentication Method for Wireless Local Area Network

Hong-tao Guo
2015 International Journal of Security and Its Applications  
This paper analyzes the various existing problems of authentication used in the field of WLAN. A fast authentication method is proposed in this article considering the character of the terminal user.  ...  Compared with existing authentication methods, this method is fast, it improves the system applicability under the comprehensive consideration of accessibility and safety.  ...  When the STA first use fast authentication system, operation on the STA side is same as the operation in the traditional portal authentication; but on the system side fast authentication system will save  ... 
doi:10.14257/ijsia.2015.9.6.06 fatcat:g2bwsm73drcupgxqwa6wzvd6ly
« Previous Showing results 1 — 15 out of 5,826 results