Sciweavers

738 search results - page 86 / 148
» Comparison of Approaches to Service Deployment
Sort
View
JASIS
2006
108views more  JASIS 2006»
13 years 8 months ago
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems
P2P applications are rapidly gaining acceptance among users of Internet-based services, especially because of their capability of exchanging resources while preserving the anonymi...
Roberto Aringhieri, Ernesto Damiani, Sabrina De Ca...
INFOCOM
2012
IEEE
11 years 11 months ago
Towards temporal access control in cloud computing
—Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integ...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang,...
ICEBE
2007
IEEE
123views Business» more  ICEBE 2007»
13 years 9 months ago
Practical Access Control Management for Outsourced EPC-related Data in RFID-enabled Supply Chain
To reduce deployment and maintenance costs companies often decide to outsource parts of RFID infrastructure to an external application service provider. In scenarios where outsour...
Sergei Evdokimov, Oliver Günther
WIDM
2004
ACM
14 years 2 months ago
WISE-cluster: clustering e-commerce search engines automatically
In this paper, we propose a new approach to automatically clustering e-commerce search engines (ESEs) on the Web such that ESEs in the same cluster sell similar products. This all...
Qian Peng, Weiyi Meng, Hai He, Clement T. Yu
USS
2008
13 years 11 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian