Sciweavers

5665 search results - page 258 / 1133
» Introduction to Computer Security
Sort
View
96
Voted
CLUSTER
2002
IEEE
15 years 8 days ago
Condor-G: A Computation Management Agent for Multi-Institutional Grids
In recent years, there has been a dramatic increase in the amount of available computing and storage resources. Yet few have been able to exploit these resources in an aggregated ...
James Frey, Todd Tannenbaum, Miron Livny, Ian T. F...
87
Voted
JOC
2006
69views more  JOC 2006»
15 years 12 days ago
Characterization of Security Notions for Probabilistic Private-Key Encryption
The development of precise definitions of security for encryption, as well as a detailed understanding of their relationships, has been a major area of research in modern cryptogr...
Jonathan Katz, Moti Yung
101
Voted
CCGRID
2009
IEEE
15 years 7 months ago
GenLM: License Management for Grid and Cloud Computing Environments
—Software license management allows independent software vendors (ISVs) to control the access of their products. It is a fundamental part of the ISVs’ business strategy. A wide...
Mathias Dalheimer, Franz-Josef Pfreundt
DAWAK
2007
Springer
15 years 6 months ago
Computing Join Aggregates over Private Tables
We propose a privacy-preserving protocol for computing aggregation queries over the join of private tables. In this problem, several parties wish to share aggregated information ov...
Rong She, Ke Wang, Ada Wai-Chee Fu, Yabo Xu
OOPSLA
2007
Springer
15 years 6 months ago
Recursive adaptive computations using perobject visitors
Adaptive Programming allows developers to write structureshy programs. However, in Adaptive Programming, recursive computations are known to require a good deal of boiler plate co...
Ahmed Abdelmeged, Karl J. Lieberherr