Sciweavers

1927 search results - page 334 / 386
» An Access Control Model for Location based Services
Sort
View
QEST
2006
IEEE
15 years 4 months ago
Load Balancing for Performance Differentiation in Dual-Priority Clustered Servers
Size-based policies have been known to successfully balance load and improve performance in homogeneous cluster environments where a dispatcher assigns a job to a server strictly ...
Ningfang Mi, Qi Zhang, Alma Riska, Evgenia Smirni
WWCA
1998
Springer
15 years 2 months ago
Compact and Flexible Resolution of CBT Multicast Key-Distribution
In an open network such as the Internet, multicast security services typically start with group session-key distribution. Considering scalability for group communication among wide...
Kanta Matsuura, Yuliang Zheng, Hideki Imai
AINA
2007
IEEE
15 years 4 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
IIR
2010
14 years 8 months ago
Social Approach to Context-Aware Retrieval
In this paper we present a general purpose solution to Web content perusal by means of mobile devices, named Social Context-Aware Browser. This is a novel approach for the informa...
Luca Vassena
TASE
2008
IEEE
15 years 4 months ago
A Fundamental Permission Interpretation for Ownership Types
This paper builds a bridge between permissions and ownership types. Ownership is a recognized alias control technique. With ownership, each object is assigned an owner and any acc...
Yang Zhao, John Boyland