Sciweavers

1168 search results - page 189 / 234
» The Role of Trust Management in Distributed Systems Security
Sort
View
COMCOM
2008
104views more  COMCOM 2008»
14 years 11 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
CAI
2002
Springer
14 years 11 months ago
The Computing and Data Grid Approach: Infrastructure for Distributed Science Applications
Grid technology has evolved over the past several years to provide the services and infrastructure needed for building "virtual" systems and organizations. With this Gri...
William E. Johnston
CCS
2007
ACM
15 years 6 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
CONCUR
2004
Springer
15 years 5 months ago
Type Based Discretionary Access Control
Abstract. Discretionary Access Control (DAC) systems provide powerful mechanisms for resource management based on the selective distribution of capabilities to selected classes of ...
Michele Bugliesi, Dario Colazzo, Silvia Crafa
ICCS
2007
Springer
15 years 6 months ago
Middleware in Modern High Performance Computing System Architectures
A recent trend in modern high performance computing (HPC) system architectures employs “lean” compute nodes running a lightweight operating system (OS). Certain parts of the OS...
Christian Engelmann, Hong Ong, Stephen L. Scott