Sciweavers

1316 search results - page 10 / 264
» A Computational Approach to Compare Information Revelation P...
Sort
View
SRDS
2010
IEEE
14 years 7 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
SIGUCCS
2000
ACM
15 years 1 months ago
Computer Abuse, Information Technologies and Judicial Affairs
Crime on the Internet has become a formidable challenge for university information technology and student judicial systems. The nature of university computing requires a relativel...
Elizabeth Mackenzie, Kathryn Goldman
ESORICS
2002
Springer
15 years 9 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti
76
Voted
ICDCS
1999
IEEE
15 years 1 months ago
Imprecise Calendars: an Approach to Scheduling Computational Grids
We describe imprecise calendars, a way to organize and schedule clusters of nodes in a computation grid. Imprecise calendars permit the easy and efficient sharing of resources bet...
Jeffrey K. Hollingsworth, Songrit Maneewongvatana
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
An ECA-P Policy-based Framework for Managing Ubiquitous Computing Environments
Ubiquitous Computing Environments feature massively distributed systems containing a large number of devices, services and applications that help end-users perform various kinds o...
Chetan Shiva Shankar, Anand Ranganathan, Roy H. Ca...