Sciweavers

3614 search results - page 652 / 723
» Numerical Computing with MATLAB
Sort
View
NDSS
2006
IEEE
15 years 7 months ago
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
SIGCOMM
2006
ACM
15 years 7 months ago
Quantifying Skype user satisfaction
The success of Skype has inspired a generation of peer-topeer-based solutions for satisfactory real-time multimedia services over the Internet. However, fundamental questions, suc...
Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-L...
IPPS
2005
IEEE
15 years 7 months ago
Security-Driven Heuristics and A Fast Genetic Algorithm for Trusted Grid Job Scheduling
In this paper, our contributions are two-fold: First, we enhance the Min-Min and Sufferage heuristics under three risk modes driven by security concerns. Second, we propose a new ...
Shanshan Song, Yu-Kwong Kwok, Kai Hwang
SIGUCCS
2005
ACM
15 years 7 months ago
A case study: implementing novell identity management at Drew University
Starting in 2003, Drew University began a process to replace its manual account management procedures with an automated provisioning system based upon Novell technologies. Over th...
E. Axel Larsson
109
Voted
EGC
2005
Springer
15 years 7 months ago
Experiences of Applying Advanced Grid Authorisation Infrastructures
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured that the security mechanisms needed to support Grid based collaborations are at l...
Richard O. Sinnott, A. J. Stell, David W. Chadwick...