Sciweavers

1587 search results - page 288 / 318
» Access Control for Shared Resources
Sort
View
JCP
2008
206views more  JCP 2008»
13 years 11 months ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
JSW
2008
106views more  JSW 2008»
13 years 11 months ago
Factors that Significantly Impact the Implementation of an Agile Software Development Methodology
The Internet economy has altered the current rules of software engineering. Traditional development methodologies have proven too cumbersome to meet the rapidly changing requiremen...
Jeffrey A. Livermore
JCP
2007
153views more  JCP 2007»
13 years 10 months ago
An Integrated Educational Platform Implementing Real, Remote Lab-Experiments for Electrical Engineering Courses
—This paper describes an Internet-based laboratory, named Remote Monitored and Controlled Laboratory (RMCLab) developed at University of Patras, Greece, for electrical engineerin...
Dimitris Karadimas, Kostas Efstathiou
TJS
2002
128views more  TJS 2002»
13 years 10 months ago
Packet Spacing: An Enabling Mechanism for Delivering Multimedia Content in Computational Grids
Streaming multimedia with UDP has become increasingly popular over distributed systems like the Internet. Scientific applications that stream multimedia include remote computation...
Annette C. Feng, Apu Kapadia, Wu-chun Feng, Geneva...
PODC
2011
ACM
13 years 1 months ago
Securing social networks
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
Michael Backes, Matteo Maffei, Kim Pecina