Sciweavers

8243 search results - page 137 / 1649
» Can We Manage Trust
Sort
View
EUROSYS
2010
ACM
14 years 3 months ago
NOVA: a microhypervisor-based secure virtualization architecture
The availability of virtualization features in modern CPUs has reinforced the trend of consolidating multiple guest operating systems on top of a hypervisor in order to improve pl...
Udo Steinberg, Bernhard Kauer
ESWS
2008
Springer
13 years 12 months ago
xOperator - Interconnecting the Semantic Web and Instant Messaging Networks
Instant Messaging (IM) is in addition to Web and Email the most popular service on the Internet. With xOperator we present a strategy and implementation which deeply integrates Ins...
Sebastian Dietzold, Jörg Unbehauen, Söre...
COMCOM
2008
138views more  COMCOM 2008»
13 years 10 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
IHI
2010
124views Healthcare» more  IHI 2010»
13 years 5 months ago
Reliable medical recommendation systems with patient privacy
One of the concerns patients have when confronted with a medical condition is which physician to trust. Any recommendation system that seeks to answer this question must ensure an...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla
GCC
2004
Springer
14 years 3 months ago
Reliable Accounting in Grid Economic Transactions
In the Grid computing model a remote service is provided by a resource owner to a client. The resource owner executes a client job and charges the client for a corresponding fee. I...
Luigi Catuogno, Pompeo Faruolo, Umberto Ferraro Pe...