Sciweavers

1109 search results - page 68 / 222
» Decentralized access control in distributed file systems
Sort
View
IPPS
2005
IEEE
15 years 7 months ago
A Mutual Anonymous Peer-to-Peer Protocol Design
Peer-to-Peer (P2P) computing has become a popular application model because of its easy resource sharing pattern and powerful query search scheme. However, decentralized P2P archi...
Jinsong Han, Yunhao Liu, Li Xiao, Renyi Xiao, Lion...
ICDCS
2003
IEEE
15 years 7 months ago
Integrated Access Control and Intrusion Detection for Web Servers
Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between thes...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, L...
CONCURRENCY
2008
104views more  CONCURRENCY 2008»
15 years 2 months ago
PERMIS: a modular authorization infrastructure
Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users....
David W. Chadwick, Gansen Zhao, Sassa Otenko, Roma...
SCANGIS
2003
15 years 3 months ago
Concurrency Control in Distributed Geographical Database Systems
Abstract. This paper discusses concurrency control in distributed geographical database systems. A geographic data server providing transactional services must be designed to handl...
Gjermund Hanssen
PE
2008
Springer
113views Optimization» more  PE 2008»
15 years 1 months ago
Joint uplink and downlink admission control to both streaming and elastic flows in CDMA/HSDPA systems
TCP-based data flows generate packets and ACKs in two directions, be it in the wireline or wireless networks. In the latter case, packets are typically found in the downlink where...
Tijani Chahed, Eitan Altman, Salah-Eddine Elayoubi