Sciweavers

883 search results - page 113 / 177
» An Access Control Model Based on Distributed Knowledge Manag...
Sort
View
WWCA
1998
Springer
15 years 4 months ago
Compact and Flexible Resolution of CBT Multicast Key-Distribution
In an open network such as the Internet, multicast security services typically start with group session-key distribution. Considering scalability for group communication among wide...
Kanta Matsuura, Yuliang Zheng, Hideki Imai
107
Voted
SERP
2003
15 years 1 months ago
A Vision for Product Traceability Based on Semantics of Artifacts
In the face of extensive attention form both the research community and the industry, traceability there still lacks of a supporting methodology that enables traceability througho...
Darijus Strasunskas
105
Voted
SACMAT
2009
ACM
15 years 7 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
FAST
2009
14 years 10 months ago
HYDRAstor: A Scalable Secondary Storage
HYDRAstor is a scalable, secondary storage solution aimed at the enterprise market. The system consists of a back-end architectured as a grid of storage nodes built around a distr...
Cezary Dubnicki, Leszek Gryz, Lukasz Heldt, Michal...
VLDB
1994
ACM
84views Database» more  VLDB 1994»
15 years 4 months ago
A Transaction Replication Scheme for a Replicated Database with Node Autonomy
Many proposed protocols for replicated databases consider centralized control of each transaction so that given a transaction, some site will monitor the remote data access and tr...
Ada Wai-Chee Fu, David Wai-Lok Cheung