Sciweavers

1057 search results - page 99 / 212
» Type-Based Distributed Access Control
Sort
View
IJNSEC
2007
139views more  IJNSEC 2007»
15 years 2 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
KES
2008
Springer
15 years 28 days ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail
MOBIHOC
2002
ACM
16 years 2 months ago
Performance evaluation of a fair backoff algorithm for IEEE 802.11 DFWMAC
Due to hidden terminals and a dynamic topology, contention among stations in an ad-hoc network is not homogeneous. Some stations are at a disadvantage in opportunity of access to ...
Zuyuan Fang, Brahim Bensaou, Yu Wang
SAINT
2009
IEEE
15 years 9 months ago
On Enhancing Event-to-Sink Data Delivery Throughput in Sensor Networks
The many-to-one multihop traffic pattern of Wireless Sensor Networks (WSN) puts a great challenge on enhancing the event-to-sink data delivery throughput. Because, in CSMA/CA dri...
Md. Abdur Razzaque, Choong Seon Hong, Jin-Woong Ch...
IWQOS
2004
Springer
15 years 7 months ago
Triage: performance isolation and differentiation for storage systems
Abstract— Ensuring performance isolation and differentiation among workloads that share a storage infrastructure is a basic requirement in consolidated data centers. Existing man...
Magnus Karlsson, Christos T. Karamanolis, Xiaoyun ...