Sciweavers

514 search results - page 66 / 103
» Flexible OS Support and Applications for Trusted Computing
Sort
View
DIM
2007
ACM
15 years 3 months ago
Using reputation to augment explicit authorization
Online social networks are formed when web applications allow users to contribute to an online community. The explosive growth of these social networks taxes the management capaci...
Phillip J. Windley, Devlin Daley, Bryant Cutler, K...
EGC
2005
Springer
15 years 5 months ago
The Gridkit Distributed Resource Management Framework
Traditionally, distributed resource management/ scheduling systems for the Grid (e.g. Globus/ GRAM/ Condor-G) have tended to deal with coarsegrained and concrete resource types (e....
Wei Cai, Geoff Coulson, Paul Grace, Gordon S. Blai...
GCC
2004
Springer
15 years 5 months ago
A New Grid Security Framework with Dynamic Access Control
Abstract. In this paper, a new Grid security framework based on dynamic access control is introduced to address some security problem in Grid. Based on the dynamic evaluating resul...
Bing Xie, Xiaolin Gui, Yinan Li, Depei Qian
DBSEC
2009
124views Database» more  DBSEC 2009»
15 years 26 days ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
VISUALIZATION
1999
IEEE
15 years 4 months ago
Visualization of Conflicts and Resolutions in a "Free Flight" Scenario
"Free Flight" will change today's air traffic control system by giving pilots increased flexibility to choose and modify their routes in real time, reducing costs a...
Ronald Azuma, Howard Neely, Michael Daily, Mario C...