Sciweavers

1517 search results - page 230 / 304
» Time and Location Based Services with Access Control
Sort
View
POPL
2000
ACM
15 years 1 months ago
Verifying Secrets and Relative Secrecy
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given value. For example, an ATM machi...
Dennis M. Volpano, Geoffrey Smith
ICSOC
2004
Springer
15 years 3 months ago
An OGSA-based accounting system for allocation enforcement across HPC centers
In this paper, we present an Open Grid Services Architecture (OGSA)-based decentralized allocation enforcement system, developed with an emphasis on a consistent data model and ea...
Thomas Sandholm, Peter Gardfjäll, Erik Elmrot...
IWNAS
2008
IEEE
15 years 4 months ago
Accurate Performance Modeling and Guidance to the Adoption of an Inconsistency Detection Framework
With the increased popularity of replica-based services in distributed systems such as the Grid, consistency control among replicas becomes more and more important. To this end, I...
Yijun Lu, Xueming Li, Hong Jiang
MM
2009
ACM
144views Multimedia» more  MM 2009»
15 years 4 months ago
Peer-assisted view-dependent progressive mesh streaming
Progressive mesh streaming is increasingly used in 3D networked applications, such as online games, virtual worlds, and digital museums. To scale such applications to a large numb...
Wei Cheng, Dan Liu, Wei Tsang Ooi
SDMW
2005
Springer
15 years 3 months ago
Metadata Management in Outsourced Encrypted Databases
Abstract. Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service, where a client’s database is stored at an external servi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...