Sciweavers

1168 search results - page 191 / 234
» The Role of Trust Management in Distributed Systems Security
Sort
View
WAC
2004
Springer
122views Communications» more  WAC 2004»
15 years 5 months ago
Spatial Computing: An Emerging Paradigm for Autonomic Computing and Communication
Emerging distributed computing scenarios call for novel “autonomic” approaches to distributed systems development and management. In this position paper we analyze the distingu...
Franco Zambonelli, Marco Mamei
ACSAC
2001
IEEE
15 years 3 months ago
Genoa TIE, Advanced Boundary Controller Experiment
This document describes experimentation performed as part of the Genoa Technology Integration Experiment (TIE). Achieved in two phases, the overarching assertion of the Genoa TIE ...
Eric Monteith
HPCC
2007
Springer
15 years 6 months ago
Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections
As Grids become increasingly relied upon as critical infrastructure, it is imperative to ensure the highly-available and secure day-to-day operation of the Grid infrastructure. The...
Jonathan C. Rowanhill, Glenn S. Wasson, Zach Hill,...
SOSP
2003
ACM
15 years 8 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
16 years 1 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu