Sciweavers

505 search results - page 47 / 101
» Access Control and Trust in the Use of Widely Distributed Se...
Sort
View
IPCCC
2006
IEEE
14 years 1 months ago
Maille authorization - a distributed, redundant authorization protocol
The Maille Authorization protocol provides flexible and reliable authorization in large distributed and pervasive computing systems. Service owners distribute their access control...
Andrew Fritz, Jehan-François Pâris
JNCA
2000
117views more  JNCA 2000»
13 years 7 months ago
Distributed network storage service with quality-of-service guarantees
This paper envisions a distributed network storage service with Quality-ofService (QoS) guarantees, and describes its architecture and key mechanisms. When fully realized, this se...
John Chung-I Chuang, Marvin A. Sirbu
KES
2008
Springer
13 years 6 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail
IAJIT
2010
157views more  IAJIT 2010»
13 years 6 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database
: Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the p...
Ashraf El-Sisi
KESAMSTA
2010
Springer
13 years 9 months ago
Modelling Dynamic Forgetting in Distributed Information Systems
Abstract. We describe and model a new aspect in the design of distributed information systems. We build upon a previously described problem on the microlevel, which asks how quickl...
Nicolas Höning, Martijn C. Schut