Sciweavers

2199 search results - page 382 / 440
» Adapting Privacy-Preserving Computation to the Service Provi...
Sort
View
POLICY
2007
Springer
15 years 6 months ago
Using SAML and XACML for Complex Resource Provisioning in Grid Based Applications
This paper presents ongoing research and current results on the development of flexible access control infrastructure for complex resource provisioning (CRP) in Grid-based applica...
Yuri Demchenko, Leon Gommans, Cees de Laat
IH
2005
Springer
15 years 6 months ago
Censorship Resistance Revisited
Abstract. “Censorship resistant” systems attempt to prevent censors from imposing a particular distribution of content across a system. In this paper, we introduce a variation ...
Ginger Perng, Michael K. Reiter, Chenxi Wang
EUROMICRO
2000
IEEE
15 years 5 months ago
Continuous Discrete-Event Simulation of a Continuous-Media Server I/O Subsystem
When designing computer systems, simulation tools are used to imitate a real or proposed system. Complex, dynamic systems can be simulated without the cost and time constraints in...
Michael Weeks, Chris Bailey, Reza Sotudeh
104
Voted
ANOR
2005
118views more  ANOR 2005»
15 years 14 days ago
Multitiered Supply Chain Networks: Multicriteria Decision - Making Under Uncertainty
: In this paper, we present a supply chain network model with multiple tiers of decision-makers, consisting, respectively, of manufacturers, distributors, and retailers, who can co...
June Dong, Ding Zhang, Hong Yan, Anna Nagurney
103
Voted
CCS
2010
ACM
14 years 11 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov