×
Abstract-This paper describes our on-going work on the components and entities that might affect the overall security design and development of a Context ...
Jul 9, 2007 · This paper describes our on-going work on the design and development of a context constrained authorisation architecture to support pervasive ...
This paper describes our on-going work on the design and development of a Context Constrained Authorisation Architecture to support Pervasive Grid Computing ...
Sep 19, 2008 · The paper discusses access control implications when bridging Pervasive and Grid computing, and analyses the limitations of current Grid ...
Jay Chin, Ning Zhang, Aleksandra Nenadic, Li Yao, J. M. Brooke: Towards Context Constrained Authorisation for Pervasive Grid Computing. COMSWARE 2007.
The paper discusses access control implications when bridging Pervasive and Grid computing, and analyses the limitations of current Grid authorisation ...
Aug 1, 2010 · The paper discusses access control implications when bridging Pervasive and Grid computing, and analyses the limitations of current Grid ...
Dive into the research topics of 'Towards context constrained authorisation for pervasive grid computing'. Together they form a unique fingerprint. Sort by ...
The paper discusses access control implications when bridging Pervasive and Grid computing, and analyses the limitations of current Grid authorisation solutions ...
The CoCoA framework takes into account not only users static attributes, but also their dynamic contextual attributes that are inherent in Pervasive computing.