Sciweavers

988 search results - page 16 / 198
» Cryptographic access control in a distributed file system
Sort
View
CCS
2005
ACM
15 years 5 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
JSW
2007
124views more  JSW 2007»
14 years 11 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon
CCGRID
2010
IEEE
14 years 9 months ago
File-Access Characteristics of Data-Intensive Workflow Applications
This paper studies five real-world data intensive workflow applications in the fields of natural language processing, astronomy image analysis, and web data analysis. Data intensiv...
Takeshi Shibata, SungJun Choi, Kenjiro Taura
CLADE
2004
IEEE
15 years 3 months ago
Support for Data-Intensive, Variable-Granularity Grid Applications via Distributed File System Virtualization - A Case Study of
A key challenge faced by large-scale, distributed applications in Grid environments is efficient, seamless data management. In particular, for applications that can benefit from a...
Jithendar Paladugula, Ming Zhao 0002, Renato J. O....
USENIX
1994
15 years 1 months ago
Reducing File System Latency using a Predictive Approach
Despite impressive advances in file system throughput resulting from technologies such as high-bandwidth networks and disk arrays, file system latency has not improved and in many...
Jim Griffioen, Randy Appleton