New Mexico Tech

Displaying 1-3 of 3 results

  • White Papers // Aug 2011

    Modeling Role-Based Trust and Authority in Open Environments

    Trust and authority are essential components that must be factored in designing and implementing a distributed access control mechanism for open environments. This paper presents a role-based approach to modeling trust and authority for open and distributed computing environments. Specifically, the authors' approach centers on the extension of role-based capability...

    Provided By New Mexico Tech

  • White Papers // May 2011

    Extending Formal Analysis of Mobile Device Authentication

    Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications must rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. Much of the focus in development of new applications in this area seeks to reduce or eliminate the...

    Provided By New Mexico Tech

  • White Papers // May 2009

    Python Imaging Library (PIL)

    The Python Imaging Library (PIL) allows one to create, modify, and convert image files in a wide variety of formats using the Python language. For additional PIL features not described in this paper, refer to the online PIL handbook3. For more information about Python, refer to the author's companion publication,...

    Provided By New Mexico Tech

  • White Papers // May 2009

    Python Imaging Library (PIL)

    The Python Imaging Library (PIL) allows one to create, modify, and convert image files in a wide variety of formats using the Python language. For additional PIL features not described in this paper, refer to the online PIL handbook3. For more information about Python, refer to the author's companion publication,...

    Provided By New Mexico Tech

  • White Papers // May 2011

    Extending Formal Analysis of Mobile Device Authentication

    Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications must rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. Much of the focus in development of new applications in this area seeks to reduce or eliminate the...

    Provided By New Mexico Tech

  • White Papers // Aug 2011

    Modeling Role-Based Trust and Authority in Open Environments

    Trust and authority are essential components that must be factored in designing and implementing a distributed access control mechanism for open environments. This paper presents a role-based approach to modeling trust and authority for open and distributed computing environments. Specifically, the authors' approach centers on the extension of role-based capability...

    Provided By New Mexico Tech