Sciweavers

1140 search results - page 125 / 228
» A Purpose-Based Access Control Model
Sort
View
CCS
2008
ACM
13 years 10 months ago
Flexible security configuration for virtual machines
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
ICSOC
2010
Springer
13 years 6 months ago
Artifact-Centric Choreographies
Classical notations for service collaborations focus either on the control flow of participating services (interacting models) or the order in which messages are exchanged (intera...
Niels Lohmann, Karsten Wolf
HPDC
1998
IEEE
14 years 7 days ago
Authorization for Metacomputing Applications
One of the most difficult problems to be solved by metacomputing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved ...
G. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman
HIPC
2009
Springer
13 years 5 months ago
Impact of early abort mechanisms on lock-based software transactional memory
Software transactional memory (STM) is an emerging concurrency control mechanism for shared memory accesses. Early abort is one of the important techniques to improve the executio...
Zhengyu He, Bo Hong
GLOBECOM
2006
IEEE
14 years 2 months ago
Modelling the Impact of User Mobility on the Throughput in Networks of Wireless 802.11 LANs
— The wireless LAN technology 802.11, also called Wi-Fi, offers high speed wireless Internet access for local area environments. WLANs provide much higher data rates than the mob...
Sandjai Bhulai, Robert D. van der Mei, Taoying Yua...