Sciweavers

1818 search results - page 255 / 364
» How users use access control
Sort
View
ESOP
2004
Springer
15 years 9 months ago
Trust Management in Strand Spaces: A Rely-Guarantee Method
We show how to combine trust management theories with nonce-based cryptographic protocols. The strand space framework for protocol analysis is extended by associating formulas from...
Joshua D. Guttman, F. Javier Thayer, Jay A. Carlso...
IPPS
2007
IEEE
15 years 10 months ago
Securing Grid Data Transfer Services with Active Network Portals
Widely available and utilized Grid servers are vulnerable to a variety of threats from Denial of Service (DoS) attacks, overloading caused by flash crowds, and compromised client ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
15 years 8 months ago
Impact of arrival burstiness on queue length: An infinitesimal perturbation analysis
Traffic burstiness has a significant impact on network performance. Burstiness can cause buffer overflows and packet drops and is particularly problematic in the context of small-b...
Yan Cai, Yong Liu, Weibo Gong, Tilman Wolf
EOR
2008
66views more  EOR 2008»
15 years 4 months ago
Multiple goals and ownership structure: Effects on the performance of Spanish savings banks
Spanish savings banks (SBs) are financial institutions with a wide mission that includes different stakeholders' goals. Profit maximization is only one among several goals, a...
Miguel García-Cestona, Jordi Surroca
ATAL
2008
Springer
15 years 6 months ago
On the importance of migration for fairness in online grid markets
Computational grids offer users a simple access to tremendous computer resources for solving large scale computing problems. Traditional performance analysis of scheduling algorit...
Lior Amar, Ahuva Mu'alem, Jochen Stößer