Sciweavers

409 search results - page 38 / 82
» Flexible Scheduler-Independent Security
Sort
View
MIDDLEWARE
2007
Springer
15 years 6 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt
ESCIENCE
2006
IEEE
15 years 5 months ago
Communication over a Secured Heterogeneous Grid with the GriddLeS Runtime Environment
Scientific workflows are a powerful programming technique for specifying complex computations using a number of otherwise independent components. When used in a Grid environment, ...
Jagan Kommineni, David Abramson, Jefferson Tan
CLUSTER
2005
IEEE
15 years 5 months ago
A Generic Proxy Mechanism for Secure Middlebox Traversal
Firewalls/NATs have brought significant connectivity problems along with their benefits, causing many applications to break or become inefficient. Due to its bi-directional commun...
Se-Chang Son, Matthew Farrellee, Miron Livny
FGCS
2008
107views more  FGCS 2008»
14 years 12 months ago
Dynamic security context management in Grid-based applications
This paper summarises ongoing research and recent results on the development of flexible access control infrastructure for complex resource provisioning in Grid-based collaborativ...
Yuri Demchenko, Olle Mulmo, Leon Gommans, Cees de ...
DATE
2004
IEEE
102views Hardware» more  DATE 2004»
15 years 3 months ago
High Security Smartcards
New consumer appliances such as PDA, Set Top Box, GSM/UMTS terminals enable an easy access to the internet and strongly contribute to the development of ecommerce and m-commerce s...
Marc Renaudin, G. Fraidy Bouesse, Ph. Proust, J. P...