Sciweavers

2560 search results - page 399 / 512
» Securing VO Management
Sort
View
ATAL
2004
Springer
15 years 9 months ago
Self-Protected Mobile Agents
In this paper, we present a new solution for the implementation of flexible protection mechanisms in the context of mobile agent systems, where security problems are currently a ...
Joan Ametller, Sergi Robles, Jose A. Ortega-Ruiz
GCC
2004
Springer
15 years 9 months ago
Trust Establishment in Large Scale Grid Settings
Trust establishment is hard in grid architecture by the ad hoc nature. To set up trust in large scale of network is more difficult. In this paper, we propose an automatic key manag...
Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhall...
125
Voted
ISI
2004
Springer
15 years 9 months ago
Privacy-Preserving Inter-database Operations
Abstract. We present protocols for distributed computation of relational intersections and equi-joins such that each site gains no information about the tuples at the other site th...
Gang Liang, Sudarshan S. Chawathe
ISI
2004
Springer
15 years 9 months ago
West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics
Abstract. Information technologies and infectious disease informatics are playing an increasingly important role in preventing, detecting, and managing infectious disease outbreaks...
Daniel Dajun Zeng, Hsinchun Chen, Chunju Tseng, Ca...
DISCEX
2003
IEEE
15 years 9 months ago
Modeling Multistep Cyber Attacks for Scenario Recognition
Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenario...
Steven Cheung, Ulf Lindqvist, Martin W. Fong