1 resultado para Adaptive Control Schemes
em DigitalCommons@University of Nebraska - Lincoln
Filtro por publicador
- ABACUS. Repositorio de Producción Científica - Universidad Europea (2)
- AMS Tesi di Dottorato - Alm@DL - Università di Bologna (17)
- AMS Tesi di Laurea - Alm@DL - Università di Bologna (9)
- ArchiMeD - Elektronische Publikationen der Universität Mainz - Alemanha (2)
- Archive of European Integration (3)
- Aston University Research Archive (52)
- Biblioteca de Teses e Dissertações da USP (1)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (4)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP) (234)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (25)
- Brock University, Canada (2)
- Bulgarian Digital Mathematics Library at IMI-BAS (6)
- CaltechTHESIS (1)
- CentAUR: Central Archive University of Reading - UK (64)
- CiencIPCA - Instituto Politécnico do Cávado e do Ave, Portugal (1)
- Cochin University of Science & Technology (CUSAT), India (7)
- Coffee Science - Universidade Federal de Lavras (1)
- Consorci de Serveis Universitaris de Catalunya (CSUC), Spain (7)
- CORA - Cork Open Research Archive - University College Cork - Ireland (1)
- CUNY Academic Works (3)
- Digital Commons - Michigan Tech (4)
- Digital Commons at Florida International University (10)
- Digital Peer Publishing (2)
- Digital Repository at Iowa State University (1)
- DigitalCommons@University of Nebraska - Lincoln (1)
- Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland (23)
- DRUM (Digital Repository at the University of Maryland) (3)
- Duke University (1)
- FUNDAJ - Fundação Joaquim Nabuco (1)
- Glasgow Theses Service (2)
- Illinois Digital Environment for Access to Learning and Scholarship Repository (3)
- Instituto Politécnico de Bragança (1)
- Instituto Politécnico do Porto, Portugal (10)
- Iowa Publications Online (IPO) - State Library, State of Iowa (Iowa), United States (1)
- Martin Luther Universitat Halle Wittenberg, Germany (1)
- Massachusetts Institute of Technology (3)
- Memorial University Research Repository (1)
- National Center for Biotechnology Information - NCBI (3)
- Nottingham eTheses (1)
- Publishing Network for Geoscientific & Environmental Data (1)
- QSpace: Queen's University - Canada (2)
- ReCiL - Repositório Científico Lusófona - Grupo Lusófona, Portugal (2)
- Repositório Científico da Universidade de Évora - Portugal (4)
- Repositório Científico do Instituto Politécnico de Lisboa - Portugal (1)
- Repositório da Escola Nacional de Administração Pública (ENAP) (1)
- Repositório da Produção Científica e Intelectual da Unicamp (18)
- Repositório Institucional da Universidade de Aveiro - Portugal (1)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (52)
- RUN (Repositório da Universidade Nova de Lisboa) - FCT (Faculdade de Cienecias e Technologia), Universidade Nova de Lisboa (UNL), Portugal (5)
- Scielo Saúde Pública - SP (16)
- Universidad del Rosario, Colombia (2)
- Universidad Politécnica de Madrid (24)
- Universidade Complutense de Madrid (2)
- Universidade Federal do Pará (1)
- Universidade Federal do Rio Grande do Norte (UFRN) (20)
- Universidade Técnica de Lisboa (1)
- Universita di Parma (1)
- Universitat de Girona, Spain (1)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (4)
- Université de Lausanne, Switzerland (21)
- University of Canberra Research Repository - Australia (1)
- University of Michigan (6)
- University of Queensland eSpace - Australia (229)
- University of Washington (3)
- WestminsterResearch - UK (1)
Resumo:
Access control is a fundamental concern in any system that manages resources, e.g., operating systems, file systems, databases and communications systems. The problem we address is how to specify, enforce, and implement access control in distributed environments. This problem occurs in many applications such as management of distributed project resources, e-newspaper and payTV subscription services. Starting from an access relation between users and resources, we derive a user hierarchy, a resource hierarchy, and a unified hierarchy. The unified hierarchy is then used to specify the access relation in a way that is compact and that allows efficient queries. It is also used in cryptographic schemes that enforce the access relation. We introduce three specific cryptography based hierarchical schemes, which can effectively enforce and implement access control and are designed for distributed environments because they do not need the presence of a central authority (except perhaps for set- UP).