Size-based policies have been known to successfully balance load and improve performance in homogeneous cluster environments where a dispatcher assigns a job to a server strictly ...
In an open network such as the Internet, multicast security services typically start with group session-key distribution. Considering scalability for group communication among wide...
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
In this paper we present a general purpose solution to Web content perusal by means of mobile devices, named Social Context-Aware Browser. This is a novel approach for the informa...
This paper builds a bridge between permissions and ownership types. Ownership is a recognized alias control technique. With ownership, each object is assigned an owner and any acc...