Sciweavers

579 search results - page 73 / 116
» Access control management for ubiquitous computing
Sort
View
POLICY
2001
Springer
14 years 9 days ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
ICC
2007
IEEE
164views Communications» more  ICC 2007»
14 years 2 months ago
An Application-Driven Mobility Management Scheme for Hierarchical Mobile IPv6 Networks
— Mobile users are expected to be highly dynamic in next generation mobile networks. Additionally they will be served a wide variety of services with different transmission rates...
Tarik Taleb, Yuji Ikeda, Kazuo Hashimoto, Yoshiaki...
CCGRID
2009
IEEE
14 years 2 months ago
The Eucalyptus Open-Source Cloud-Computing System
Cloud computing systems fundamentally provide access to large pools of data and computational resources through a variety of interfaces similar in spirit to existing grid and HPC ...
Daniel Nurmi, Richard Wolski, Chris Grzegorczyk, G...
ICAC
2006
IEEE
14 years 1 months ago
The Laundromat Model for Autonomic Cluster Computing
Traditional High Performance Computing systems require extensive management and suffer from security and configuration problems. This paper presents a new clustermanagement syste...
Jacob Gorm Hansen, Eske Christiansen, Eric Jul
EUROPAR
2005
Springer
14 years 1 months ago
Integrating Mobile Devices into the Grid: Design Considerations and Evaluation
Mobile devices increasingly offer functionality beyond the one provided by traditional resources – processor, memory and applications. This includes, for example, integrated mul...
Stavros Isaiadis, Vladimir Getov