Sciweavers

609 search results - page 59 / 122
» A Privacy Manager for Cloud Computing
Sort
View
CLOUDCOM
2010
Springer
13 years 6 months ago
Applying Twister to Scientific Applications
Many scientific applications suffer from the lack of a unified approach to support the management and efficient processing of large-scale data. The Twister MapReduce Framework, whi...
Bingjing Zhang, Yang Ruan, Tak-Lon Wu, Judy Qiu, A...
PVLDB
2011
13 years 2 months ago
Implementing Performance Competitive Logical Recovery
New hardware platforms, e.g. cloud, multi-core, etc., have led to a reconsideration of database system architecture. Our Deuteronomy project separates transactional functionality ...
David B. Lomet, Kostas Tzoumas, Michael J. Zwillin...
EUROSEC
2010
ACM
14 years 1 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
IDTRUST
2009
ACM
14 years 2 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
IEEEARES
2007
IEEE
14 years 2 months ago
Reputation Management Survey
Electronic markets, distributed peer-to-peer applications and other forms of online collaboration are all based on mutual trust, which enables transacting peers to overcome the un...
Sini Ruohomaa, Lea Kutvonen, Eleni Koutrouli