Sciweavers

2057 search results - page 101 / 412
» Distributed Secure Systems: Then and Now
Sort
View
JAR
2008
115views more  JAR 2008»
15 years 4 months ago
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
The spreading of multicast technology enables the development of group communication and so dealing with digital streams becomes more and more common over the Internet. Given the f...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...
ESORICS
2009
Springer
16 years 4 months ago
Towards a Theory of Accountability and Audit
Accountability mechanisms, which rely on after-the-fact verification, are an attractive means to enforce authorization policies. In this paper, we describe an operational model of ...
Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, Jam...
CSFW
2008
IEEE
15 years 10 months ago
Language Based Secure Communication
Secure communication in distributed systems is notoriously hard to achieve due to the variety of attacks an adversary can mount, based on message interception, modification, redi...
Michele Bugliesi, Riccardo Focardi
ICDE
2009
IEEE
164views Database» more  ICDE 2009»
16 years 5 months ago
Efficient and Robust Database Support for Data-Intensive Applications in Dynamic Environments
Requirements from new types of applications call for new database system solutions. Computational science applications performing distributed computations on Grid networks with req...
Jon Olav Hauglid, Kjetil Nørvåg, Norv...
SC
2005
ACM
15 years 9 months ago
Performance-constrained Distributed DVS Scheduling for Scientific Applications on Power-aware Clusters
Left unchecked, the fundamental drive to increase peak performance using tens of thousands of power hungry components will lead to intolerable operating costs and failure rates. H...
Rong Ge, Xizhou Feng, Kirk W. Cameron