Sciweavers

6907 search results - page 43 / 1382
» Securing distributed adaptation
Sort
View
JPDC
2007
86views more  JPDC 2007»
14 years 9 months ago
Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity
High quality of security is increasingly critical for applications running on heterogeneous distributed systems. However, existing scheduling algorithms for heterogeneous distribu...
Tao Xie 0004, Xiao Qin
SP
2000
IEEE
121views Security Privacy» more  SP 2000»
15 years 2 months ago
A Security Infrastructure for Distributed Java Applications
We describe the design and implementation of a security infrastructure for a distributed Java application. This work is inspired by SDSI/SPKI, but has a few twists of its own. We ...
Dirk Balfanz, Drew Dean, Mike Spreitzer
GCC
2003
Springer
15 years 2 months ago
Research on Security Architecture and Protocols of Grid Computing System
This paper analyzes security problems existing in Grid Computing System and describes the security mechanism in Grid Computing System. After briefly introducing the security abstra...
Xiangming Fang, Shoubao Yang, Leitao Guo, Lei Zhan...
ISW
2004
Springer
15 years 3 months ago
How to Break and Repair a Universally Composable Signature Functionality
Abstract. Canetti and Rabin recently proposed a universally composable ideal functionality FSIG for digital signatures. We show that this functionality cannot be securely realized ...
Michael Backes, Dennis Hofheinz