Sciweavers

1988 search results - page 72 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
CSE
2009
IEEE
15 years 4 months ago
A Hybrid Enforcement Model for Group-centric Secure Information Sharing
—Group-Centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized ...
Ram Krishnan, Ravi S. Sandhu
ADHOCNOW
2007
Springer
15 years 4 months ago
Dependable and Secure Distributed Storage System for Ad Hoc Networks
The increased use of ubiquitous computing devices is resulting in networks that are highly mobile, well connected and growing in processing and storage capabilities. The nature of ...
Rudi Ball, James Grant, Jonathan So, Victoria Spur...
HPCC
2005
Springer
15 years 3 months ago
A Multi-scale Computational Approach for Nanoparticle Growth in Combustion Environments
In this paper a new and powerful computer simulation capability for the characterization of carbonaceous nanoparticle assemblies across multiple, connected scales, starting from th...
Angela Violi, Gregory A. Voth
EUC
2004
Springer
15 years 3 months ago
A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment
One fundamental task to realize the envisioned ubiquitous computing paradigm is the proper management of the data generated in this environment. The special characteristics of high...
Weisong Chen, Cho-Li Wang, Francis C. M. Lau
POLICY
2007
Springer
15 years 3 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell