Sciweavers

5816 search results - page 41 / 1164
» Distributed Management by Delegation
Sort
View
CCGRID
2009
IEEE
16 years 5 days ago
Collusion Detection for Grid Computing
A common technique for result verification in grid computing is to delegate a computation redundantly to different workers and apply majority voting to the returned results. Howe...
Eugen Staab, Thomas Engel
ESCIENCE
2005
IEEE
15 years 11 months ago
Identity-Based Cryptography for Grid Security
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Hoon Wei Lim, Kenneth G. Paterson
ITCC
2005
IEEE
15 years 11 months ago
Energy Balanced Broadcasting Through Delayed Intelligence
— Ad hoc wireless networks are growing in popularity and usefulness, however they rely on broadcasting as a fundamental process for routing. Improvements to broadcasting have mad...
Michael R. Gosnell, Ryan Albarelli, Maggie Xiaoyan...
MADNES
2005
Springer
15 years 11 months ago
An XML Standards Based Authorization Framework for Mobile Agents
An outstanding security problem in mobile agent systems is resource access control, or authorization in its broader sense. In this paper we present an authorization framework for m...
Guillermo Navarro, Joan Borrell
ATAL
2003
Springer
15 years 10 months ago
Implementing responsibility for states and events
Contracts in the real world often rest upon a notion of responsibility, by which parties commit to the fulfilment of particular imperatives embedded in the contract. Responsibili...
Martin J. Kollingbaum, Timothy J. Norman, Chris Re...