Sciweavers

988 search results - page 17 / 198
» Cryptographic access control in a distributed file system
Sort
View
HPCC
2007
Springer
15 years 5 months ago
File and Memory Security Analysis for Grid Systems
The grid security architecture today does not prevent certain unauthorized access to the files associated with a job executing on a remote machine. Programs and data are transferre...
Unnati Thakore, Lorie M. Liebrock
MOBISYS
2007
ACM
15 years 11 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
HPDC
2000
IEEE
15 years 4 months ago
Grid-based File Access: The Legion I/O Model
The unprecedented scale, heterogeneity, and varied usage patterns of grids pose significant technical challenges to any underlying file system that will support them. While grid...
Brian S. White, Andrew S. Grimshaw, Anh Nguyen-Tuo...
CCGRID
2002
IEEE
15 years 4 months ago
Towards an Economy-Based Optimisation of File Access and Replication on a Data Grid
We are working on a system for the optimised access and replication of data on a Data Grid. Our approach is based on the use of an economic model that includes the actors and the ...
Mark James Carman, Floriano Zini, Luciano Serafini...
ASMTA
2008
Springer
113views Mathematics» more  ASMTA 2008»
15 years 1 months ago
Exact Sojourn Time Distribution in an Online IPTV Recording System
In this paper we analytically derive the sojourn time of a user accessing an online IPTV recording service. Basically, the system consists of a server (or server farm) and the band...
Tobias Hoßfeld, Kenji Leibnitz, Marie-Ange R...