Sciweavers

481 search results - page 75 / 97
» Analyzing and Managing Role-Based Access Control Policies
Sort
View
GI
2009
Springer
13 years 6 months ago
Introducing Community Single Sign-On for EDIT
: The European Distributed Institute of Taxonomy (EDIT) platform, as well as biodiversity providers in general, provides a multitude of web-based taxonomic applications and service...
Lutz Suhrbier
CCS
2007
ACM
14 years 3 months ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee
DOA
2001
94views more  DOA 2001»
13 years 10 months ago
How to Monitor and Control Resource Usage in Mobile Agent Systems
The Mobile Agent technology has already shown its advantages, but at the same time has already remarked new problems currently limiting its diffusion in commercial environments. A...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
ICDCSW
2003
IEEE
14 years 2 months ago
Adaptive Power Control and Selective Radio Activation for Low-Power Infrastructure-Mode 802.11 LANs
We present an integrated dual approach to reduce power consumption in infrastructure-mode 802.11 wireless LANs. A novel distributed power control algorithm adaptively adjusts the ...
Anmol Sheth, Richard Han
NPC
2005
Springer
14 years 2 months ago
A Resource-Based Server Performance Control for Grid Computing Systems
With the rapid advances in Internet and Grid technique, an increasing number of applications will involve computing systems. These applications in turn create an increasing demand ...
Naixue Xiong, Xavier Défago, Yanxiang He, Y...