Sciweavers

1988 search results - page 65 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
PCI
2009
Springer
15 years 2 months ago
A Foundation for Defining Security Requirements in Grid Computing
—Despite the wide adoption by the scientific community, grid technologies have not been given the appropriate attention by enterprises. This is merely due to the lack of enough s...
Antonios Gouglidis, Ioannis Mavridis
GRID
2007
Springer
15 years 4 months ago
Eliciting honest value information in a batch-queue environment
Abstract— Markets and auctions have been proposed as mechanisms for efficiently and fairly allocating resources in a number of different computational settings. Economic approac...
Andrew Mutz, Richard Wolski, John Brevik
SENSYS
2003
ACM
15 years 3 months ago
SIA: secure information aggregation in sensor networks
Sensor networks promise viable solutions to many monitoring problems. However, the practical deployment of sensor networks faces many challenges imposed by real-world demands. Sen...
Bartosz Przydatek, Dawn Xiaodong Song, Adrian Perr...
ECOOPW
1998
Springer
15 years 1 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
ISADS
2003
IEEE
15 years 3 months ago
An Approach to Developing Information Dissemination Service for Ubiquitous Computing Applications
In many ubiquitous computing (ubicomp) applications, such as smart classrooms, hospitals, construction sites, stadiums, shopping malls, emergency services, law enforcement, conven...
Stephen S. Yau, Sheikh Iqbal Ahamed