Sciweavers

1140 search results - page 209 / 228
» A Purpose-Based Access Control Model
Sort
View
121
Voted
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
15 years 4 months ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...
ESCIENCE
2006
IEEE
15 years 3 months ago
Scientific Workflows: More e-Science Mileage from Cyberinfrastructure
We view scientific workflows as the domain scientist's way to harness cyberinfrastructure for e-Science. Domain scientists are often interested in "end-to-end" fram...
Bertram Ludäscher, Shawn Bowers, Timothy M. M...
FOCS
2006
IEEE
15 years 5 months ago
Towards Secure and Scalable Computation in Peer-to-Peer Networks
We consider the problems of Byzantine Agreement and Leader Election, where a constant fraction b < 1/3 of processors are controlled by a malicious adversary. The first problem...
Valerie King, Jared Saia, Vishal Sanwalani, Erik V...
STORAGESS
2005
ACM
15 years 5 months ago
Secure capabilities for a petabyte-scale object-based distributed file system
Recently, the Network-Attached Secure Disk (NASD) model has become a more widely used technique for constructing large-scale storage systems. However, the security system proposed...
Christopher Olson, Ethan L. Miller
94
Voted
AIME
2005
Springer
15 years 5 months ago
Multi-agent Patient Representation in Primary Care
Though multi-agent systems have been explored in a wide variety of medical settings, their role at the primary care level has been relatively little investigated. In this paper, we...
Chris Reed, Brian Boswell, Ron Neville