Sciweavers

1132 search results - page 85 / 227
» Application of Grid Security to Personal Distributed Environ...
Sort
View
GRID
2006
Springer
13 years 8 months ago
Toward an On-Demand Restricted Delegation Mechanism for Grids
Grids are intended to enable cross-organizational interactions which makes Grid security a challenging and nontrivial issue. In Grids, delegation is a key facility that can be used...
Mehran Ahsant, Jim Basney, Olle Mulmo, Adam J. Lee...
HPDC
2007
IEEE
14 years 2 months ago
Smartsockets: solving the connectivity problems in grid computing
Tightly coupled parallel applications are increasingly run in Grid environments. Unfortunately, on many Grid sites the ability of machines to create or accept network connections ...
Jason Maassen, Henri E. Bal
ICS
2003
Tsinghua U.
14 years 1 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
COST
1997
Springer
113views Multimedia» more  COST 1997»
14 years 7 days ago
Resource Selection in Heterogeneous Communication Environments Using the Teleservice Descriptor
: Automated processes in distributed communication environments require tools for unifying heterogeneous multimedia services. The Teleservice Descriptor is introduced for generic h...
Tom Pfeifer, Stefan Arbanowski, Radu Popescu-Zelet...
SGAI
2004
Springer
14 years 1 months ago
Implementing Policy Management through BDI
The requirement for Grid middleware to be largely transparent to individual users and at the same time act in accordance with their personal needs is a difficult challenge. In e-...
Simon Miles, Juri Papay, Michael Luck, Luc Moreau