Sciweavers

1134 search results - page 63 / 227
» Distributed Proving in Access-Control Systems
Sort
View
HPDC
2003
IEEE
15 years 8 months ago
Using Views for Customizing Reusable Components in Component-Based Frameworks
Increasingly, scalable distributed applications are being constructed by integrating reusable components spanning multiple administrative domains. Dynamic composition and deployme...
Anca-Andreea Ivan, Vijay Karamcheti
113
Voted
ACSAC
2002
IEEE
15 years 8 months ago
A Security Architecture for Object-Based Distributed Systems
Large-scale distributed systems present numerous security problems not present in local systems. In this paper we present a general security architecture for a large-scale object-...
Bogdan C. Popescu, Maarten van Steen, Andrew S. Ta...
CDC
2009
IEEE
191views Control Systems» more  CDC 2009»
15 years 8 months ago
Convergence and stability of a distributed CSMA algorithm for maximal network throughput
—Designing efficient scheduling algorithms is an important problem in a general class of networks with resourcesharing constraints, such as wireless networks and stochastic proc...
Libin Jiang, Jean C. Walrand
COMCOM
1998
52views more  COMCOM 1998»
15 years 2 months ago
Dissemination of state information in distributed autonomous systems
Many researchers are devising algorithms for task placement in distributed systems, but few are designing the necessary mechanisms to provide the information required by those alg...
Steve J. Chapin, Eugene H. Spafford
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
15 years 1 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...