Sciweavers

1316 search results - page 10 / 264
» A Computational Approach to Compare Information Revelation P...
Sort
View
SRDS
2010
IEEE
14 years 9 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
SIGUCCS
2000
ACM
15 years 2 months ago
Computer Abuse, Information Technologies and Judicial Affairs
Crime on the Internet has become a formidable challenge for university information technology and student judicial systems. The nature of university computing requires a relativel...
Elizabeth Mackenzie, Kathryn Goldman
ESORICS
2002
Springer
15 years 10 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti
ICDCS
1999
IEEE
15 years 3 months ago
Imprecise Calendars: an Approach to Scheduling Computational Grids
We describe imprecise calendars, a way to organize and schedule clusters of nodes in a computation grid. Imprecise calendars permit the easy and efficient sharing of resources bet...
Jeffrey K. Hollingsworth, Songrit Maneewongvatana
MOBIQUITOUS
2005
IEEE
15 years 4 months ago
An ECA-P Policy-based Framework for Managing Ubiquitous Computing Environments
Ubiquitous Computing Environments feature massively distributed systems containing a large number of devices, services and applications that help end-users perform various kinds o...
Chetan Shiva Shankar, Anand Ranganathan, Roy H. Ca...