Sciweavers

2281 search results - page 255 / 457
» Security Patterns and Secure Systems Design
Sort
View
131
Voted
IFIPTM
2009
149views Management» more  IFIPTM 2009»
15 years 1 months ago
An Experimental Testbed for Evaluation of Trust and Reputation Systems
Abstract. To date, trust and reputation systems have often been evaluated using methods of their designers' own devising. Recently, we demonstrated that a number of noteworthy...
Reid Kerr, Robin Cohen
194
Voted

Book
688views
17 years 1 months ago
Database Management Systems
A set of presentations covering the book, which includes the following topics ER Model and Conceptual Design, The Relational Model and SQL DDL, Relational Algebra, SQL, Database Ap...
Raghu Ramakrishnan, Johannes Gehrke
258
Voted
CCGRID
2008
IEEE
15 years 10 months ago
An Autonomic Workflow Management System for Global Grids
Workflow Management System is generally utilized to define, manage and execute workflow applications on Grid resources. However, the increasing scale complexity, heterogeneity and...
Mustafizur Rahman 0003, Rajkumar Buyya
128
Voted
TC
1998
15 years 3 months ago
A Metaobject Architecture for Fault-Tolerant Distributed Systems: The FRIENDS Approach
—The FRIENDS system developed at LAAS-CNRS is a metalevel architecture providing libraries of metaobjects for fault tolerance, secure communication, and group-based distributed a...
Jean-Charles Fabre, Tanguy Pérennou
135
Voted
CCS
2008
ACM
15 years 5 months ago
Online subscriptions with anonymous access
Online privacy is an increasingly important problem, as many services are now offered in a digital form. Privacy (or the lack thereof) is of a special concern in subscriptions to ...
Marina Blanton