Sciweavers

1733 search results - page 290 / 347
» Web Services: Distributed Applications Without Limits
Sort
View
CASSIS
2005
Springer
15 years 3 months ago
The Architecture of a Privacy-Aware Access Control Decision Component
Today many interactions are carried out online through Web sites and e-services and often private and/or sensitive information is required by service providers. A growing concern r...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
ICDCS
2007
IEEE
15 years 4 months ago
Automated Storage Reclamation Using Temporal Importance Annotations
This work focuses on scenarios that require the storage of large amounts of data. Such systems require the ability to either continuously increase the storage space or reclaim spa...
Surendar Chandra, Ashish Gehani, Xuwen Yu
SPW
2004
Springer
15 years 3 months ago
One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA
How can we design a PDA that is at the same time secure and usable? In current implementations the two properties are mutually exclusive. Because normal users find password entry ...
Frank Stajano
WOSP
2000
ACM
15 years 2 months ago
Expressing meaningful processing requirements among heterogeneous nodes in an active network
Active Network technology envisions deployment of virtual execution environments within network elements, such as switches and routers. As a result, nonhomogeneous processing can ...
Virginie Galtier, Kevin L. Mills, Yannick Carlinet...
CORR
2004
Springer
127views Education» more  CORR 2004»
14 years 9 months ago
Monitoring, Analyzing, and Controlling Internet-scale Systems with ACME
Analyzing and controlling large distributed services under a wide range of conditions is difficult. Yet these capabilities are essential to a number of important development and o...
David L. Oppenheimer, Vitaliy Vatkovskiy, Hakim We...