We present a model-checking algorithm which can be used to evaluate access control policies, and a tool which implements it. The evaluation includes not only assessing whether the ...
As grid computing becomes more commonplace, so does the importance of coscheduling these geographically distributed resourcest. Negotiating resource management and scheduling deci...
Kenneth Yoshimoto, Patricia A. Kovatch, Phil Andre...
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
A global Internet overlay testbed is being deployed to support the distributed, shared use of resources for network research. The Global X-Bone (GX-Bone) augments the X-Bone softw...
Joseph D. Touch, Yu-Shun Wang, Venkata K. Pingali,...
This paper describes personalization metadata standards that can be used to enable individuals to access and use resources based on a user's particular requirements. The pape...
Ann Chapman, Brian Kelly, Liddy Nevile, Andy Heath