Sciweavers

271 search results - page 28 / 55
» Cryptographic Security for a High-Performance Distributed Fi...
Sort
View
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
15 years 8 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
131
Voted
GRID
2006
Springer
15 years 2 months ago
Cacheable Decentralized Groups for Grid Resource Access Control
Abstract-- Sharing data among collaborators in widely distributed systems remains a challenge due to limitations with existing methods for defining groups across administrative dom...
Jeffrey Hemmes, Douglas Thain
118
Voted
IPPS
2002
IEEE
15 years 7 months ago
Architecture of the Entropia Distributed Computing System
Distributed Computing, the exploitation of idle cycles on pervasive desktop PC systems offers the opportunity to increase the available computing power by orders of magnitude (10x...
Andrew A. Chien
EDO
2005
Springer
15 years 7 months ago
Secure event types in content-based, multi-domain publish/subscribe systems
Publish/subscribe research has so far been mostly focused on efficient event routing, event filtering, and composite event detection. The little research that has been published ...
Lauri I. W. Pesonen, Jean Bacon
STORAGESS
2005
ACM
15 years 8 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok