Sciweavers

2187 search results - page 83 / 438
» Providing Security Services in a Resource Discovery System
Sort
View
MSV
2004
15 years 1 months ago
Towards Quality of Service Based Resource Management for Cluster-Based Image Database
The main research in the area of image databases addresses the improvement of retrieval quality and the speedup of the query processing. A number of image retrieval systems reache...
Andreas Brüning, Frank Drews, Martin Hoefer, ...
CORR
2002
Springer
93views Education» more  CORR 2002»
14 years 11 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker
ICECCS
2005
IEEE
86views Hardware» more  ICECCS 2005»
15 years 5 months ago
Exploiting OS-Level Mechanisms to Implement Mobile Code Security
Mobile code systems provide an infrastructure that supports autonomous mobile components, called mobile agents. The infrastructure implements services for the transfer, execution,...
Viktoria Felmetsger, Giovanni Vigna
CMS
2003
108views Communications» more  CMS 2003»
15 years 1 months ago
Towards an IPv6-Based Security Framework for Distributed Storage Resources
Abstract. Some security problems can be often solved through authorization rather than authentication. Furthermore, certificate-based authorization approach can alleviate usual dr...
Alessandro Bassi, Julien Laganier
IPTPS
2005
Springer
15 years 5 months ago
Evaluating DHT-Based Service Placement for Stream-Based Overlays
Stream-based overlay networks (SBONs) are one approach to implementing large-scale stream processing systems. A fundamental consideration in an SBON is that of service placement, ...
Peter R. Pietzuch, Jeffrey Shneidman, Jonathan Led...