Sciweavers

534 search results - page 56 / 107
» Aggregating and Deploying Network Access Control Policies
Sort
View
IEEEIAS
2007
IEEE
15 years 6 months ago
Modelling Quality of Protection in Outsourced Business Processes
There is a large number of research papers and standards dedicated to security for outsourced data. Yet, most papers propose new controls to access and protect the data rather tha...
Fabio Massacci, Artsiom Yautsiukhin
HPDC
2003
IEEE
15 years 5 months ago
Using Views for Customizing Reusable Components in Component-Based Frameworks
Increasingly, scalable distributed applications are being constructed by integrating reusable components spanning multiple administrative domains. Dynamic composition and deployme...
Anca-Andreea Ivan, Vijay Karamcheti
EUROPAR
2000
Springer
15 years 3 months ago
An Architecture for Web-Based Interaction and Steering of Adaptive Parallel/Distributed Applications
This paper presents an architecture for web-based interaction and steering of parallel/distributed scientific applications. The architecture is composed of detachable thin-clients ...
Rajeev Muralidhar, Samian Kaur, Manish Parashar
CN
2002
87views more  CN 2002»
14 years 11 months ago
Securing distributed adaptation
Open architecture networks provide applications with fine-grained control over network elements. With this control comes the risk of misuse and new challenges to security beyond th...
Jun Li, Mark Yarvis, Peter L. Reiher
PERCOM
2006
ACM
15 years 11 months ago
Avoiding privacy violations caused by context-sensitive services
The increasing availability of information about people's context makes it possible to deploy context-sensitive services, where access to resources provided or managed by a s...
Urs Hengartner, Peter Steenkiste