Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo M...
Rapid growth of the demand for computational power by scientific, business and web-applications has led to the creation of large-scale data centers consuming enormous amounts of el...
Multimedia streaming is one of the most attractive services over the Internet, for which bandwidth is a primary constraint. For live streaming, however, the computational resource ...
Meng-Ting Lu, Chang-Kuan Lin, Jason Yao, Homer H. ...
The US Power Industry is in the process of overhauling the Power Grid to make it more secure, reliable, and available. The IT systems that comprise a major part of this change nee...
Himanshu Khurana, Mohammad Maifi Hasan Khan, Von W...
The heterogeneous nature and independent administration of geographically dispersed resources in Grid, demand the need for access control using fine-grained policies. In this pape...
Elisa Bertino, Pietro Mazzoleni, Bruno Crispo, Swa...