• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,561
Next 10 →

Authentication Authorization Calendar

by M. Olkin, Eric S. Chan, Rafiul Ahad , 2009
"... Version 1.1: 03/24/2009- Conference to subclass Folder This document describes the object model for Beehive. The document does not attempt to define the model in terms of an actual programming language. Instead, we describe the model using a concise abstract notation. Once we have specified the abst ..."
Abstract - Add to MetaCart
Version 1.1: 03/24/2009- Conference to subclass Folder This document describes the object model for Beehive. The document does not attempt to define the model in terms of an actual programming language. Instead, we describe the model using a concise abstract notation. Once we have specified the abstract model, we will be able to define a programming language binding to the model.

A logic of authentication

by Michael Burrows, Martín Abadi, Roger Needham - ACM TRANSACTIONS ON COMPUTER SYSTEMS , 1990
"... Questions of belief are essential in analyzing protocols for the authentication of principals in distributed computing systems. In this paper we motivate, set out, and exemplify a logic specifically designed for this analysis; we show how various protocols differ subtly with respect to the required ..."
Abstract - Cited by 1332 (22 self) - Add to MetaCart
Questions of belief are essential in analyzing protocols for the authentication of principals in distributed computing systems. In this paper we motivate, set out, and exemplify a logic specifically designed for this analysis; we show how various protocols differ subtly with respect to the required

Authentication, authorization, and accounting: Protocol evaluation

by Group D. Mitton, S. Barkley, D. Nelson, B. Patil, M. Stevens, B. Wolff, Databus Inc , 2001
"... Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice

Quality of Service Authentication, Authorization and Accounting

by Tseno Tsenov , Hannes Tschofenig
"... Abstract. Proper authorization is essential for a QoS signaling protocol. The policy control of future QoS signaling solutions is expected to make use of existing AAA infrastructure for computing the authorization decision. In this paper, we point to two approaches for QoS authorization (based on C ..."
Abstract - Add to MetaCart
Abstract. Proper authorization is essential for a QoS signaling protocol. The policy control of future QoS signaling solutions is expected to make use of existing AAA infrastructure for computing the authorization decision. In this paper, we point to two approaches for QoS authorization (based

Guidance for Authentication, Authorization, and Accounting (AAA) Key Management

by R. Housley, B. Aboba, Key Management - BCP 132, RFC 4962, July 2007. Narayanan & Dondeti Standards Track [Page 41] 5296 ERP , 2008
"... This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The IETF Trust (2007). This document provides guidance to designers of Authenticatio ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
of Authentication, Authorization, and Accounting (AAA) key management protocols. The guidance is also useful to designers of systems and solutions that include AAA key management protocols. Given the complexity and difficulty in designing secure, long-lasting key management algorithms and protocols by experts

Abstract Authentication, Authorization, and Accounting (AAA) Goals

by G. Giaretta, I. Guardini, E. Demaria, Telecom Italia, J. Bournelle, R. Lopez, For Mobile Ipv , 2009
"... service offered by a Mobility Services Provider (MSP). In this case, all protocol operations may need to be explicitly authorized and traced, requiring the interaction between Mobile IPv6 and the AAA infrastructure. Integrating the Authentication, Authorization, and Accounting (AAA) infrastructure ( ..."
Abstract - Add to MetaCart
service offered by a Mobility Services Provider (MSP). In this case, all protocol operations may need to be explicitly authorized and traced, requiring the interaction between Mobile IPv6 and the AAA infrastructure. Integrating the Authentication, Authorization, and Accounting (AAA) infrastructure

Authentication, Authorization, Accounting, and Charging for the Mobile Internet

by Hasan Jürgen Jähnert
"... Mobile data services across the Internet pave the path for a society of tomorrow. Users will be able to access data, information, and services independent of their location. This will ease the way of business and private life, such as for the travelling field engineer repairing electronic devices at ..."
Abstract - Add to MetaCart
features. An important one is the infrastructure for Authentication, Authorization, Accounting, and Charging (AAAC) those mobile services. These functions will ensure that mobility will not happen into places where not authorized and will enable a commercial operation of a network, which offers services

1 The 3 “A”s: Authentication, Authorization, Accounting

by unknown authors , 2005
"... For the road travelers in the United States, especially the parents who take their children in the family car on the long road trips, the letters AAA stand for a peace of mind. They feel that any time their car breaks down, they can call the number for the American Automobile Association and ask for ..."
Abstract - Add to MetaCart
for roadside assistance. Even though this book is not about that sort of AAA, the 3 “A”s that we talk about here, when designed properly, can bring the same peace of mind to the network operator and its customers. Authentication, authorization, and accounting are three important blocks used in the construction

The anatomy of the Grid: Enabling scalable virtual organizations.

by Ian Foster , • , Carl Kesselman , Steven Tuecke - The International Journal of High Performance Computing Applications , 2001
"... Abstract "Grid" computing has emerged as an important new field, distinguished from conventional distributed computing by its focus on large-scale resource sharing, innovative applications, and, in some cases, high-performance orientation. In this article, we define this new field. First, ..."
Abstract - Cited by 2673 (86 self) - Add to MetaCart
, we review the "Grid problem," which we define as flexible, secure, coordinated resource sharing among dynamic collections of individuals, institutions, and resources-what we refer to as virtual organizations. In such settings, we encounter unique authentication, authorization, resource

The physiology of the grid: An open grid services architecture for distributed systems integration

by Ian Foster , 2002
"... In both e-business and e-science, we often need to integrate services across distributed, heterogeneous, dynamic “virtual organizations ” formed from the disparate resources within a single enterprise and/or from external resource sharing and service provider relationships. This integration can be t ..."
Abstract - Cited by 1377 (33 self) - Add to MetaCart
, and notification. Service bindings can support reliable invocation, authentication, authorization, and delegation, if required. Our presentation complements an earlier foundational article, “The Anatomy of the Grid, ” by describing how Grid mechanisms can implement a service-oriented architecture, explaining how
Next 10 →
Results 1 - 10 of 3,561
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University