Sciweavers

6907 search results - page 367 / 1382
» Securing distributed adaptation
Sort
View
CCGRID
2006
IEEE
15 years 11 months ago
An Overview of Security Issues in Cluster Interconnects
— Widespread use of cluster systems in diverse set of applications has spurred significant interest in providing high performance cluster interconnects. A major inefficiency in...
Manhee Lee, Eun Jung Kim, Ki Hwan Yum, Mazin S. Yo...
SCN
2010
Springer
122views Communications» more  SCN 2010»
15 years 3 months ago
A New Security Model for Authenticated Key Agreement
The Canetti–Krawczyk (CK) and extended Canetti–Krawczyk (eCK) security models, are widely used to provide security arguments for key agreement protocols. We discuss security s...
Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Cla...
IPPS
2007
IEEE
15 years 11 months ago
A Key-based Adaptive Transactional Memory Executor
Software transactional memory systems enable a programmer to easily write concurrent data structures such as lists, trees, hashtables, and graphs, where non-conflicting operation...
Tongxin Bai, Xipeng Shen, Chengliang Zhang, Willia...
128
Voted
NCA
2005
IEEE
15 years 10 months ago
Networking Aspects in the DPASA Survivability Architecture: An Experience Report
The same network infrastructure that is essential for the operation of today’s high valued distributed systems can also be misused by malicious attackers. Experience shows that ...
Michael Atighetchi, Paul Rubel, Partha Pratim Pal,...
151
Voted
EGC
2005
Springer
15 years 10 months ago
M-Grid: Using Ubiquitous Web Technologies to Create a Computational Grid
Abstract. There are many potential users and uses for grid computing. However, the concept of sharing computing resources excites security concerns and, whilst being powerful and f...
Robert John Walters, Stephen Crouch