Sciweavers

1923 search results - page 136 / 385
» Modeling Complexity in Secure Distributed Computing
Sort
View
POLICY
2001
Springer
15 years 2 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
SIGADA
2001
Springer
15 years 2 months ago
Targeting Ada95/DSA for distributed simulation of multiprotocol communication networks
The last years have seen an increasing, albeit restricted simulation of large-scale networks on shared memory parallel platforms. As the complexity of communication protocols and ...
Dhavy Gantsou
GCC
2003
Springer
15 years 3 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
JACM
2006
98views more  JACM 2006»
14 years 10 months ago
Distribution sort with randomized cycling
Parallel independent disks can enhance the performance of external memory (EM) algorithms, but the programming task is often di cult. In this paper we develop randomized variants ...
Jeffrey Scott Vitter, David A. Hutchinson
PADS
2005
ACM
15 years 3 months ago
Concurrent Replication of Parallel and Distributed Simulations
Parallel and distributed simulations enable the analysis of complex systems by concurrently exploiting the aggregate computation power and memory of clusters of execution units. I...
Luciano Bononi, Michele Bracuto, Gabriele D'Angelo...