Sciweavers

225 search results - page 37 / 45
» Behavior-Based Access Control for Distributed Healthcare Env...
Sort
View
MIDDLEWARE
2007
Springer
15 years 5 months ago
A service-oriented virtual community overlay network for secure external service orchestration
The Service Oriented Architecture (SOA) is used extensively in ubiquitous computing environments. Using external service orchestration, services can be composed into applications....
Shudong Chen, Johan J. Lukkien
HPDC
1999
IEEE
15 years 4 months ago
Resource Co-Allocation in Computational Grids
Applications designed to execute on "computational grids" frequently require the simultaneous co-allocation of multiple resources in order to meet performance requiremen...
Karl Czajkowski, Ian T. Foster, Carl Kesselman
DSN
2003
IEEE
15 years 5 months ago
Detection and Handling of MAC Layer Misbehavior in Wireless Networks
Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolution mechanisms for sharing the wireless channel. In this environment, selfish...
Pradeep Kyasanur, Nitin H. Vaidya
104
Voted
NDSS
2002
IEEE
15 years 4 months ago
PAMINA: A Certificate Based Privilege Management System
In this paper we present PAMINA (Privilege Administration and Management INfrAstructure), a privilege management system using authorization certificates. Our system supports distr...
Zoltán Nochta, Peter Ebinger, Sebastian Abe...
CORR
2010
Springer
92views Education» more  CORR 2010»
14 years 11 months ago
Promoting Component Reuse by Separating Transmission Policy from Implementation
In this paper we present a methodology and set of tools which assist the construction of applications from components, by separating the issues of transmission policy from compone...
Scott M. Walker, Alan Dearle, Graham N. C. Kirby, ...