Sciweavers

661 search results - page 4 / 133
» Distributed and Secure Access Control in P2P Databases
Sort
View
JCP
2008
206views more  JCP 2008»
13 years 6 months ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
BDA
2007
13 years 7 months ago
PeerSum: Summary Management in P2P Systems
Sharing huge, massively distributed databases in P2P systems is inherently difficult. As the amount of stored data increases, data localization techniques become no longer suffi...
Rabab Hayek, Guillaume Raschia, Patrick Valduriez,...
EDBT
2008
ACM
102views Database» more  EDBT 2008»
14 years 6 months ago
Summary management in P2P systems
Sharing huge, massively distributed databases in P2P systems is inherently difficult. As the amount of stored data increases, data localization techniques become no longer suffici...
Rabab Hayek, Guillaume Raschia, Patrick Valduriez,...
P2P
2007
IEEE
110views Communications» more  P2P 2007»
14 years 8 days ago
PISA: P2P Wi-Fi Internet Sharing Architecture
— The demand for cheap broadband Internet for nomadic users has created a market for Internet sharing. WiFi communities which allow their users to share their wired Internet conn...
Tobias Heer, Shaohui Li, Klaus Wehrle
DEXA
2009
Springer
201views Database» more  DEXA 2009»
14 years 17 days ago
Dynamic Query Processing for P2P Data Services in the Cloud
With the trend of cloud computing, data and computing are moved away from desktop and are instead provided as a service from the cloud. Data-as-a-service enables access to a wealth...
Pawel Jurczyk, Li Xiong