Sciweavers

5816 search results - page 9 / 1164
» Distributed Management by Delegation
Sort
View
CCS
2003
ACM
15 years 4 months ago
Origin authentication in interdomain routing
Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
William Aiello, John Ioannidis, Patrick Drew McDan...
EDBTW
2004
Springer
15 years 5 months ago
XML-Based Revocation and Delegation in a Distributed Environment
Abstract. The rapid increase on the circulation of data over the web has highlighted the need for distributed storage of Internet-accessible information due to the rapid increase o...
Konstantina Stoupa, Athena Vakali, Fang Li, Ioanni...
PKC
1999
Springer
86views Cryptology» more  PKC 1999»
15 years 4 months ago
Preserving Privacy in Distributed Delegation with Fast Certificates
Abstract. In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and w...
Pekka Nikander, Yki Kortesniemi, Jonna Partanen
JSSPP
2010
Springer
14 years 9 months ago
The Gain of Resource Delegation in Distributed Computing Environments
Abstract. In this paper, we address job scheduling in Distributed Computing Infrastructures, that is a loosely coupled network of autonomous acting High Performance Computing syste...
Alexander Fölling, Christian Grimme, Joachim ...