Sciweavers

769 search results - page 117 / 154
» Policy Storage for Role-Based Access Control Systems
Sort
View
TII
2008
169views more  TII 2008»
14 years 10 months ago
Fine-Tuning MAC-Level Protocols for Optimized Real-Time QoS
In distributed real-time systems, meeting the real-time constraints is mandatory but the satisfaction of other application-dependent criteria is most generally required as well. I...
Mathieu Grenier, Nicolas Navet
92
Voted
SDMW
2005
Springer
15 years 4 months ago
Experiments with Queries over Encrypted Data Using Secret Sharing
To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an ...
Richard Brinkman, Berry Schoenmakers, Jeroen Doume...
ACSW
2007
15 years 9 days ago
Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research
An infrastructure for remote instrument access, data acquisition and data management is being developed for e-Research. The Common Instrument Middleware Architecture (CIMA) is bei...
Ian M. Atkinson, Douglas du Boulay, Clinton Chee, ...
72
Voted
CCGRID
2005
IEEE
15 years 4 months ago
A distributed shared buffer space for data-intensive applications
Efficient memory allocation and data transfer for cluster-based data-intensive applications is a difficult task. Both changes in cluster interconnects and application workloads ...
Renaud Lachaize, Jorgen S. Hansen
WIKIS
2009
ACM
15 years 5 months ago
Cosmos: a Wiki data management system
Wiki applications are becoming increasingly important for knowledge sharing between large numbers of users. To prevent against vandalism and recover from damaging edits, wiki appl...
Qinyi Wu, Calton Pu, Danesh Irani