Sciweavers

988 search results - page 108 / 198
» Cryptographic access control in a distributed file system
Sort
View
CCS
2008
ACM
15 years 1 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
HCW
1998
IEEE
15 years 4 months ago
CCS Resource Management in Networked HPC Systems
CCS is a resource management system for parallel high-performance computers. At the user level, CCS provides vendor-independent access to parallel systems. At the system administr...
Axel Keller, Alexander Reinefeld
SOSP
2005
ACM
15 years 8 months ago
The taser intrusion recovery system
Recovery from intrusions is typically a very time-consuming operation in current systems. At a time when the cost of human resources dominates the cost of computing resources, we ...
Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li,...
DGO
2000
91views Education» more  DGO 2000»
15 years 1 months ago
Simplifying data access: the energy data collection (EDC) project
The massive amount of statistical and text data available from government agencies has created a set of daunting challenges to both research and analysis communities. These proble...
José Luis Ambite, Yigal Arens, Luis Gravano...
CONCUR
2007
Springer
15 years 6 months ago
Mobility Control Via Passports
Dπ is a simple distributed extension of the π-calculus in which agents are explicitly located, and may use an explicit migration construct to move between locations. In this pap...
Samuel Hym