Sciweavers

1860 search results - page 114 / 372
» Jiro Storage Management
Sort
View
COMPSEC
2002
92views more  COMPSEC 2002»
15 years 16 days ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong
116
Voted
CCS
2010
ACM
15 years 4 months ago
Data protection in outsourcing scenarios: issues and directions
Data outsourcing is an emerging paradigm that allows users and companies to give their (potentially sensitive) data to external servers that then become responsible for their stor...
Pierangela Samarati, Sabrina De Capitani di Vimerc...
103
Voted
BTW
2007
Springer
189views Database» more  BTW 2007»
15 years 6 months ago
Reconsidering Consistency Management in Shared Data Spaces for Emergency and Rescue Applications
: Efficient information sharing is very important for emergency and rescue operations. These operations often have to be performed in environments where no communication infrastruc...
Thomas Plagemann, Ellen Munthe-Kaas, Vera Goebel
MIDDLEWARE
2007
Springer
15 years 6 months ago
Semantics-based grid resource management
Scheduling parallel and distributed applications efficiently onto grid environments is a difficult task and a great variety of scheduling heuristics have been developed aiming to ...
Alexandre Ceasar Tavares Vidal, Francisco Jos&eacu...
127
Voted
ESCIENCE
2006
IEEE
15 years 6 months ago
Managing Large-Scale Workflow Execution from Resource Provisioning to Provenance Tracking: The CyberShake Example
This paper discusses the process of building an environment where large-scale, complex, scientific analysis can be scheduled onto a heterogeneous collection of computational and s...
Ewa Deelman, Scott Callaghan, Edward Field, Hunter...