Sciweavers

703 search results - page 133 / 141
» A Framework for Outsourcing of Secure Computation
Sort
View
KBSE
2007
IEEE
14 years 1 months ago
Extracting rights and obligations from regulations: toward a tool-supported process
Security, privacy and governance are increasingly the focus of government regulations in the U.S., Europe and elsewhere. This trend has created a “regulation compliance” probl...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
CONCUR
2007
Springer
14 years 1 months ago
Making Random Choices Invisible to the Scheduler
Abstract. When dealing with process calculi and automata which express both nondeterministic and probabilistic behavior, it is customary to introduce the notion of scheduler to res...
Konstantinos Chatzikokolakis, Catuscia Palamidessi
POLICY
2007
Springer
14 years 1 months ago
Using SAML and XACML for Complex Resource Provisioning in Grid Based Applications
This paper presents ongoing research and current results on the development of flexible access control infrastructure for complex resource provisioning (CRP) in Grid-based applica...
Yuri Demchenko, Leon Gommans, Cees de Laat
LCN
2006
IEEE
14 years 1 months ago
The Internet Group Management Protocol with Access Control (IGMP-AC)
IP Multicast is best known for its bandwidth conservation and lower resource utilization. The classical model of multicast makes it difficult to permit access only to authorized ...
Salekul Islam, J. William Atwood
NETGAMES
2005
ACM
14 years 27 days ago
FreeRank: implementing independent ranking service for multiplayer online games
Ranking is necessary for multiplayer online games to provide players with self-complacence and reference for choosing game counterparts. Most existing ranking solutions are tightl...
Li Tang, Jun Li, Jin Zhou, Zhizhi Zhou, Hao Wang, ...