Sciweavers

988 search results - page 126 / 198
» Cryptographic access control in a distributed file system
Sort
View
SACMAT
2009
ACM
15 years 6 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
CAISE
2001
Springer
15 years 4 months ago
Objects Control for Software Configuration Management
A major requirement in Software Engineering is to reduce the time to market. This requirement along with a demand for product sophistication and better quality has led to larger te...
Jacky Estublier
CORR
2010
Springer
224views Education» more  CORR 2010»
14 years 12 months ago
A Cluster Based Replication Architecture for Load Balancing in Peer-to-Peer Content Distribution
In P2P systems, large volumes of data are declustered naturally across a large number of peers. But it is very difficult to control the initial data distribution because every use...
S. Ayyasamy, S. N. Sivanandam
SOCIALCOM
2010
14 years 9 months ago
Measurement, Modeling, and Analysis of a Large-scale Blog Sever Workload
Despite the growing popularity of Online Social Networks (OSNs), the workload characteristics of OSN servers, such as those hosting blog services, are not well understood. Understa...
Myeongjae Jeon, Jeaho Hwang, Youngjae Kim, Jae-Wan...
CLUSTER
2006
IEEE
15 years 3 months ago
Lightweight I/O for Scientific Applications
Today's high-end massively parallel processing (MPP) machines have thousands to tens of thousands of processors, with next-generation systems planned to have in excess of one...
Ron Oldfield, Lee Ward, Rolf Riesen, Arthur B. Mac...