Sciweavers

1186 search results - page 15 / 238
» A New Approach to Secure Logging
Sort
View
ICDCS
1998
IEEE
14 years 21 days ago
CLIQUES: A New Approach to Group Key Agreement
This paper considers the problem of key agreement in a group setting with highly-dynamic group member population. A protocol suite, called CLIQUES, is developed by extending the w...
Michael Steiner, Gene Tsudik, Michael Waidner
CLUSTER
2002
IEEE
14 years 1 months ago
A New Architecture for Secure Carrier-Class Clusters
Traditionally, the telecom industry has used clusters to meet its carrier-class requirements of high availability, reliability, and scalability, while relying on cost-effective ha...
Makan Pourzandi, Ibrahim Haddad, Charles Levert, M...
JPDC
2007
86views more  JPDC 2007»
13 years 8 months ago
Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity
High quality of security is increasingly critical for applications running on heterogeneous distributed systems. However, existing scheduling algorithms for heterogeneous distribu...
Tao Xie 0004, Xiao Qin
ICDE
2009
IEEE
126views Database» more  ICDE 2009»
14 years 3 months ago
Transaction Support for Log-Based Middleware Server Recovery
Abstract— We have developed log-based recovery for middleware servers that access back-end transaction systems (DBMSs). Transactional consistency is provided between in-memory st...
Rui Wang 0002, Betty Salzberg, David B. Lomet
SIGMOD
2011
ACM
169views Database» more  SIGMOD 2011»
12 years 11 months ago
Leveraging query logs for schema mapping generation in U-MAP
In this paper, we introduce U-MAP, a new system for schema mapping generation. U-MAP builds upon and extends existing schema mapping techniques. However, it mitigates some key pro...
Hazem Elmeleegy, Ahmed K. Elmagarmid, Jaewoo Lee