Sciweavers

1587 search results - page 31 / 318
» Access Control for Shared Resources
Sort
View
CCS
2006
ACM
15 years 7 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
RTSS
2006
IEEE
15 years 10 months ago
Resource Sharing in EDF-Scheduled Systems: A Closer Look
Resource sharing in priority-based systems can give rise to priority-inversion and blocking, wherein a job’s execution is delayed because a lower-priority job holds some resourc...
Sanjoy K. Baruah
RTAS
2007
IEEE
15 years 10 months ago
Resource-Locking Durations in EDF-Scheduled Systems
The duration of time for which each application locks each shared resource is critically important in composing multiple independently-developed applications upon a shared “open...
Nathan Fisher, Marko Bertogna, Sanjoy K. Baruah
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
15 years 9 months ago
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach
Controlling access to resources is one of the most important protection goals for web-based services in practice. In general, access control requires identification of subjects t...
Ruben Wolf, Thomas Keinz, Markus Schneider
CCGRID
2002
IEEE
15 years 9 months ago
The Internet Backplane Protocol: A Study in Resource Sharing
In this work we present the Internet Backplane Protocol (IBP), a middleware created to allow the sharing of storage resources, implemented as part of the network fabric. IBP allow...
Alessandro Bassi, Micah Beck, Graham E. Fagg, Terr...