Sciweavers

2614 search results - page 351 / 523
» Customizable Data Distribution for Shared Data Spaces
Sort
View
147
Voted
SISW
2005
IEEE
15 years 9 months ago
Lazy Revocation in Cryptographic File Systems
A crucial element of distributed cryptographic file systems are key management solutions that allow for flexible but secure data sharing. We consider efficient key management s...
Michael Backes, Christian Cachin, Alina Oprea
WAIM
2005
Springer
15 years 9 months ago
An Ontology-Based Host Resources Monitoring Approach in Grid Environment
Monitoring the real-time status of voluntary nodes is a basic task of Quality of Services (QoS) management in grid. The heterogeneity of distributed host resources is an obvious ob...
Yijiao Yu, Hai Jin
165
Voted
PERCOM
2004
ACM
16 years 3 months ago
Towards Scalable P2P Computing for Mobile Ad Hoc Networks
In mobile ad hoc networks, nodes interact peer-to-peer. They self-organize, share workloads and provide services that they also use. There are middleware platforms, designed for t...
Marco Conti, Enrico Gregori, Giovanni Turi
AINA
2007
IEEE
15 years 10 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
126
Voted
WMPI
2004
ACM
15 years 9 months ago
A localizing directory coherence protocol
User-controllable coherence revives the idea of cooperation between software and hardware in an attempt to bridge the gap between efficient small-scale shared memory machines and m...
Collin McCurdy, Charles N. Fischer