Sciweavers

517 search results - page 54 / 104
» Distributed Authentication in GRID5000
Sort
View
SPAA
2010
ACM
15 years 2 months ago
Brief announcement: byzantine agreement with homonyms
In this work, we address Byzantine agreement in a message passing system with homonyms, i.e. a system with a number l of authenticated identities that is independent of the total ...
Carole Delporte-Gallet, Hugues Fauconnier, Rachid ...
WECWIS
1999
IEEE
116views ECommerce» more  WECWIS 1999»
15 years 2 months ago
Towards a Scalable PKI for Electronic Commerce Systems
In an e-commerce system, security, in particular authentication, is of paramount importance. Public-key Infrastructure is often used to enforce authentication and the property of ...
Chenxi Wang, William A. Wulf
IASTEDSE
2004
14 years 11 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
GCC
2003
Springer
15 years 3 months ago
Network Storage Management in Data Grid Environment
This paper presents the Network Storage Manager (NSM) developed in the Distributed Computing Laboratory at Jackson State University. NSM is designed as a Java-based, high-performan...
Shaofeng Yang, Zeyad Ali, Houssain Kettani, Vinti ...
FCS
2006
14 years 11 months ago
Cryptographic and Computational Challenges in Grid Computing
A computational grid is a large-scale distributed computing environment capable of providing dependable, consistent, pervasive, and inexpensive access to high-end computational re...
Song Y. Yan, Glyn James, Gongyi Wu