Sciweavers

330 search results - page 54 / 66
» A Policy Language for Integrating Heterogeneous Authorizatio...
Sort
View
134
Voted
EUROSEC
2010
ACM
15 years 7 months ago
Practical protection for personal storage in the cloud
We present a storage management framework for Web 2.0 services that places users back in control of their data. Current Web services complicate data management due to data lock-in...
Neal H. Walfield, Paul T. Stanton, John Linwood Gr...
DOA
2001
94views more  DOA 2001»
15 years 3 months ago
How to Monitor and Control Resource Usage in Mobile Agent Systems
The Mobile Agent technology has already shown its advantages, but at the same time has already remarked new problems currently limiting its diffusion in commercial environments. A...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
COMCOM
2008
138views more  COMCOM 2008»
15 years 1 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
DEBU
2010
127views more  DEBU 2010»
14 years 11 months ago
Provenance in ORCHESTRA
Sharing structured data today requires agreeing on a standard schema, then mapping and cleaning all of the data to achieve a single queriable mediated instance. However, for setti...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...
HPDC
1998
IEEE
15 years 6 months ago
A Resource Query Interface for Network-Aware Applications
Development of portable network-aware applications demands an interface to the network that allows an application to obtain information about its execution environment. This paper...
Bruce Lowekamp, Nancy Miller, Dean Sutherland, Tho...