Sciweavers

1988 search results - page 95 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
ESORICS
2002
Springer
16 years 2 months ago
Computational Probabilistic Non-interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
Michael Backes, Birgit Pfitzmann
SPAA
1997
ACM
15 years 7 months ago
Accessing Nearby Copies of Replicated Objects in a Distributed Environment
Consider a set of shared objects in a distributed network, where several copies of each object may exist at any given time. To ensure both fast access to the objects as well as e ...
C. Greg Plaxton, Rajmohan Rajaraman, Andréa...
HPDC
2005
IEEE
15 years 8 months ago
411 on scalable password service
In this paper we present 411, a password distribution system for high performance environments that provides security and scalability. We show that existing solutions such as NIS ...
Federico D. Sacerdoti, Mason J. Katz, Philip M. Pa...
GIS
2009
ACM
16 years 4 months ago
Efficient and Secure Distribution of Massive Geo-Spatial Data
Modern geographic databases can contain a large volume of data that need to be distributed to subscribed customers. The data can be modeled as a cube, where typical dimensions inc...
Hao Yuan, Mikhail J. Atallah
128
Voted
HCW
1999
IEEE
15 years 7 months ago
Adaptive Distributed Applications on Heterogeneous Networks
Distributed applications execute in environments that can include different network architectures as well as a range of compute platforms. Furthermore, these resources are shared ...
Thomas R. Gross, Peter Steenkiste, Jaspal Subhlok