Sciweavers

1402 search results - page 76 / 281
» Distributed Integrity Checking for Systems with Replicated D...
Sort
View
144
Voted
EUROSYS
2011
ACM
14 years 7 months ago
DepSky: dependable and secure storage in a cloud-of-clouds
The increasing popularity of cloud storage services has lead companies that handle critical data to think about using these services for their storage needs. Medical record databa...
Alysson Neves Bessani, Miguel P. Correia, Bruno Qu...
OTM
2009
Springer
15 years 10 months ago
Proactive Byzantine Quorum Systems
Byzantine Quorum Systems is a replication technique used to ensure availability and consistency of replicates data even in presence of arbitrary faults. This paper presents a Byzan...
Eduardo Adílio Pelinson Alchieri, Alysson N...
144
Voted
CW
2005
IEEE
15 years 9 months ago
Data Integration for Virtual Enterprise in Cyberworlds
Virtual Enterprise enables companies to collaborate through sharing of resources, and therefore allows them to enjoy the benefits of virtual integration. The essence of Virtual En...
Cheng Leong Ang, Robert Kheng Leng Gay, Olga Souri...
155
Voted
ACSAC
2000
IEEE
15 years 8 months ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik
102
Voted
ECIS
2004
15 years 4 months ago
Group Decision Support for Resource Allocation Decisions in Three-person Groups
This research studied the effects of a Group Decision Support System (GDSS) for face-to-face negotiations in three-person groups. The GDSS equipped the groups with full informatio...
Jerry van Leeuwen, Hans van der Heijden, Reinhard ...