Sciweavers

1286 search results - page 55 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
INFOCOM
2008
IEEE
15 years 9 months ago
Fast and Distributed Computation of Schedules in Wireless Networks
—In a wireless network with node exclusive spectrum sharing, two popular schedules are maximum weight matching (MWM) schedule and maximum size matching (MSM) schedule. The former...
Supratim Deb, Karan Mangla, K. V. M. Naidu
CCGRID
2002
IEEE
15 years 8 months ago
Towards Trust-Aware Resource Management in Grid Computing Systems
Resource management is a central part of a Grid computing system. In a large-scale wide-area system such as the Grid, security is a prime concern. One approach is to be conservati...
Farag Azzedin, Muthucumaru Maheswaran
119
Voted
WWW
2008
ACM
16 years 3 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
EDOC
2008
IEEE
15 years 3 months ago
A Tactic-Based Approach to Embodying Non-functional Requirements into Software Architectures
This paper presents an approach for embodying nonfunctional requirements (NFRs) into software architecture using architectural tactics. Architectural tactics are reusable architec...
Suntae Kim, Dae-Kyoo Kim, Lunjin Lu, Sooyong Park
NSPW
2006
ACM
15 years 9 months ago
PKI design for the real world
What would a PKI look like if it were designed for implementability and deployability rather than strict adherence to a particular theoretical or mathematical model? This paper pr...
Peter Gutmann