Sciweavers

988 search results - page 162 / 198
» Cryptographic access control in a distributed file system
Sort
View
ICTAI
2009
IEEE
15 years 6 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
KIVS
2001
Springer
15 years 4 months ago
Real-Time Support on Top of Ethernet
Ethernet is a widely used low-cost networking technology. It however lacks the determinism and resource management features needed to meet realtime requirements of multimedia appli...
Rainer Koster, Thorsten Kramp
HICSS
2008
IEEE
144views Biometrics» more  HICSS 2008»
15 years 6 months ago
Frameworks for Securing Limited-Device Applications
In this paper, we compare the features available for developing secure distributed applications for limited devices, such as smart phones. We limit our scope to examine frameworks...
Timothy E. Lindquist, Aarthi Ramamurthy, Ramon Ang...
WSC
2007
15 years 2 months ago
Simulation of time to first water application for the First Interstate Bank fire
On May 4, 1988 a fire occurred after hours on the 12th floor of the First Interstate Bank building, a 62 story steelframe office tower in Los Angeles California. The sprinkler sys...
Robert Till
GRID
2008
Springer
14 years 12 months ago
Market-oriented Grids and Utility Computing: The State-of-the-art and Future Directions
Traditional resource management techniques (resource allocation, admission control and scheduling) have been found to be inadequate for many shared Grid and distributed systems th...
James Broberg, Srikumar Venugopal, Rajkumar Buyya