منابع مشابه
A New Approach for Delegation Using Hierarchical Delegation Tokens
In this paper we give a classiication of delegation schemes into four main classes. To solve the problem with simply chained tokens in cascaded delegations we introduce the concept of hierarchical delegation tokens. To realize this concept we use the Schnorr signature scheme and self{certiied public keys introduced by Girault. We describe the rst approach for hierarchical key generation based o...
متن کاملNatural photonics for industrial inspiration.
There are two considerations for optical biomimetics: the diversity of submicrometre architectures found in the natural world, and the industrial manufacture of these. A review exists on the latter subject, where current engineering methods are considered along with those of the natural cells. Here, on the other hand, I will provide a modern review of the different categories of reflectors and ...
متن کاملDelegation Constraint Management Delegation Constraint Management
The paper addresses the issue of providing access control via delegation and constraint management across multiple security domains. Specifically, this paper proposes a novel Delegation Constraint Management model to manage and enforce delegation constraints across security domains. An algorithm to trace the authority of delegation constraints is introduced as well as an algorithm to form a del...
متن کاملDelegation Protocols for Electronic Commerce
Many commercial and financial activities in the real-life require reliable mechansisms to provide accountability for the transactions that has been executed. If electronic commerce aim to substitute or support similar activities in the electronic world, it has to provide the same degree of accountability. Despite this requirement is crucial, we observe that many existing security mechanisms and...
متن کاملArgumentation Strategies for Task Delegation
What argument(s) do I put forward in order to persuade another agent to do something for me? This is an important question for an autonomous agent collaborating with others to solve a problem. How effective were similar arguments in convincing similar agents in similar circumstances? What are the risks associated with putting certain arguments forward? Can agents exploit evidence derived from p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Vital
سال: 2010
ISSN: 1741-7503,1741-7511
DOI: 10.1038/vital1142