Sciweavers

1833 search results - page 56 / 367
» Mechanized Verification with Sharing
Sort
View
BDIM
2007
IEEE
95views Business» more  BDIM 2007»
15 years 7 months ago
A Mechanism of Specifying and Determining Pricing in Utility Computing Environments
Utility services providers offer on-demand services for multiple users and applications from a shared resource pool. The utility computing environment provider manages resources th...
Jinsong Ouyang, Akhil Sahai, Jim Pruyne
119
Voted
SDMW
2004
Springer
15 years 6 months ago
A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms
Abstract. Due to the growing interest in XML security, various access control schemes have been proposed recently. However, little effort has been put forth to facilitate a unifor...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
NETWORKING
2010
15 years 2 months ago
Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding
Embedding of virtual network (VN) requests on top of a shared physical network poses an intriguing combination of theoretical and practical challenges. Two major problems with the ...
Nabeel Farooq Butt, N. M. Mosharaf Kabir Chowdhury...
101
Voted
CCS
2009
ACM
15 years 7 months ago
A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms
We enforce information flow policies in programs that run at multiple locations, with diverse levels of security. We build a compiler from a small imperative language with locali...
Cédric Fournet, Gurvan Le Guernic, Tamara R...
88
Voted
WISE
2002
Springer
15 years 5 months ago
A Content-Based Resource Location Mechanism in PeerIS
With the flurry of research on P2P computing, many P2P technical challenges have emerged, one of which is how to efficiently locate desired resources. Advances have been made in...
Bo Ling, Zhiguo Lu, Wee Siong Ng, Beng Chin Ooi, K...