Constandache, 2005 - Google Patents
Distributed Policy-Based Dynamic Negotiation for Grid Services AuthorizationConstandache, 2005
View PDF- Document ID
- 951071508829949553
- Author
- Constandache I
- Publication year
External Links
Snippet
I developed my diploma thesis during a six month internship at L3S Research Center and University of Hannover, Germany. L3S Research Center has been founded in 2001 as a joint institute of University of Hannover, Technical University Carolo-Wilhelmina at …
- 238000011160 research 0 abstract description 19
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations contains provisionally no documents
- H04L12/18—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
- H04L12/1822—Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Damiani et al. | Managing multiple and dependable identities | |
Basney et al. | Negotiating trust on the grid | |
Nacer et al. | A distributed authentication model for composite Web services | |
Coetzee et al. | Virtual enterprise access control requirements | |
Demchenko | Virtual organisations in computer grids and identity management | |
Bussard et al. | Delegation of access rights in multi-domain service compositions | |
Al-Jaroodi et al. | Security middleware approaches and issues for ubiquitous applications | |
Pöhn et al. | Reference Service Model Framework for Identity Management | |
Paolini et al. | Authentication, authorization, and accounting | |
Constandache et al. | Policy based dynamic negotiation for grid services authorization | |
Nazareth et al. | Using spki/sdsi for distributed maintenance of attribute release policies in shibboleth | |
Constandache | Distributed Policy-Based Dynamic Negotiation for Grid Services Authorization | |
Servos | A role and attribute based encryption approach to privacy and security in cloud based health services | |
Boehm et al. | Federated authentication and authorization: A case study | |
Vo | Identity as a Service: An adaptive security infrastructure and privacy-preserving user identity for the cloud environment | |
Lee et al. | Automated trust negotiation in open systems | |
Nazareth | Spade: Spki/sdsi for attribute release policies in a distributed environment | |
Constandache et al. | Policy-driven negotiation for authorization in the grid | |
Weaver et al. | Using web service enhancements to establish trust relationships with privacy protection (extended and invited from icws 2006 with id 47) | |
Agazzi et al. | Trust Negotiation for Automated Service Integration | |
Indrakanti et al. | On the design, implementation and application of an authorisation architecture for web services | |
Fernandez et al. | Web services security | |
Lorch | PRIMA: Privilege management and authorization in grid computing environments | |
Li et al. | Zebra copy: A reference implementation of federated access management | |
Baiardi et al. | Constrained automata: a formal tool for ICT risk assessment |