Sciweavers

2335 search results - page 56 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
141
Voted
DBSEC
2010
162views Database» more  DBSEC 2010»
15 years 6 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
112
Voted
SP
2000
IEEE
121views Security Privacy» more  SP 2000»
15 years 9 months ago
A Security Infrastructure for Distributed Java Applications
We describe the design and implementation of a security infrastructure for a distributed Java application. This work is inspired by SDSI/SPKI, but has a few twists of its own. We ...
Dirk Balfanz, Drew Dean, Mike Spreitzer
ACSAC
2004
IEEE
15 years 8 months ago
Security Policies to Mitigate Insider Threat in the Document Control Domain
With rapid advances in online technologies, organizations are migrating from paper based resources to digital documents to achieve high responsiveness and ease of management. Thes...
Suranjan Pramanik, Vidyaraman Sankaranarayanan, Sh...
INFOSCALE
2007
ACM
15 years 6 months ago
An adaptive admission control policy for geographically distributed web systems
Novella Bartolini, Gian Carlo Bongiovanni, Simone ...
MOBIHOC
2004
ACM
16 years 4 months ago
Towards mobility as a network control primitive
In the near future, the advent of large-scale networks of mobile agents autonomously performing long-term sensing and communication tasks will be upon us. However, using controlle...
David Kiyoshi Goldenberg, Jie Lin, A. Stephen Mors...