Sciweavers

988 search results - page 112 / 198
» Cryptographic access control in a distributed file system
Sort
View
SSDBM
2003
IEEE
118views Database» more  SSDBM 2003»
15 years 5 months ago
A Practical Approach for Microscopy Imaging Data Management (MIDM) in Neuroscience
Current data management approaches can easily handle the relatively simple requirements for molecular biology research but not the more varied and sophisticated microscopy imaging...
Shenglan Zhang, Xufei Qian, Amarnath Gupta, Maryan...
NETWORKING
2004
15 years 1 months ago
Network-Embedded Programmable Storage and Its Applications
We consider the utility of two key properties of network-embedded storage: programmability and network-awareness. We describe two extensive applications, whose performance and fun...
Sumeet Sobti, Junwen Lai, Yilei Shao, Nitin Garg, ...
IEEEARES
2008
IEEE
15 years 6 months ago
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks
— Access control concerns in MANETs are very serious and considered as a crucial challenge for operators who prospects to employ unrivaled capabilities of such networks for diffe...
Amir R. Khakpour, Maryline Laurent-Maknavicius, Ha...
OSDI
2008
ACM
16 years 4 days ago
CuriOS: Improving Reliability through Operating System Structure
An error that occurs in a microkernel operating system service can potentially result in state corruption and service failure. A simple restart of the failed service is not always...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
COMPSEC
2010
93views more  COMPSEC 2010»
14 years 12 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang