Sciweavers

872 search results - page 91 / 175
» An Access Control Language for a General Provenance Model
Sort
View
FGCS
2008
107views more  FGCS 2008»
13 years 7 months ago
Dynamic security context management in Grid-based applications
This paper summarises ongoing research and recent results on the development of flexible access control infrastructure for complex resource provisioning in Grid-based collaborativ...
Yuri Demchenko, Olle Mulmo, Leon Gommans, Cees de ...
ERCIMDL
2009
Springer
177views Education» more  ERCIMDL 2009»
14 years 11 days ago
Curated Databases
Curated databases are databases that are populated and updated with a great deal of human effort. Most reference works that one traditionally found on the reference shelves of li...
Peter Buneman
ASPLOS
2004
ACM
14 years 1 months ago
Formal online methods for voltage/frequency control in multiple clock domain microprocessors
Multiple Clock Domain (MCD) processors are a promising future alternative to today’s fully synchronous designs. Dynamic Voltage and Frequency Scaling (DVFS) in an MCD processor ...
Qiang Wu, Philo Juang, Margaret Martonosi, Douglas...
CODASPY
2012
12 years 3 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...
SOUPS
2009
ACM
14 years 2 months ago
Social applications: exploring a more secure framework
Online social network sites, such as MySpace, Facebook and others have grown rapidly, with hundreds of millions of active users. A new feature on many sites is social applications...
Andrew Besmer, Heather Richter Lipford, Mohamed Sh...