Sciweavers

573 search results - page 44 / 115
» The Policy Machine for Security Policy Management
Sort
View
SWS
2004
ACM
15 years 3 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
ECOOPW
1999
Springer
15 years 2 months ago
The Role of Trust Management in Distributed Systems Security
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
JPDC
2006
175views more  JPDC 2006»
14 years 9 months ago
Stochastic modeling and analysis of hybrid mobility in reconfigurable distributed virtual machines
Virtualization provides a vehicle to manage the available resources and enhance their utilization in network computing. System dynamics requires virtual machines be distributed an...
Song Fu, Cheng-Zhong Xu
CLOUDCOM
2009
Springer
15 years 1 months ago
Cost-Minimizing Scheduling of Workflows on a Cloud of Memory Managed Multicore Machines
Workflows are modeled as hierarchically structured directed acyclic graphs in which vertices represent computational tasks, referred to as requests, and edges represent precedent c...
Nicolas G. Grounds, John K. Antonio, Jeffrey T. Mu...
JSW
2008
122views more  JSW 2008»
14 years 9 months ago
Security of Distributed Digital Criminal Dossiers
Abstract-- Securely managing shared information in distributed environments across multiple organisations is a challenge. Distributed information management systems must be able to...
Martijn Warnier, Frances M. T. Brazier, Anja Oskam...