Sciweavers

2057 search results - page 121 / 412
» Distributed Secure Systems: Then and Now
Sort
View
CCS
2004
ACM
15 years 9 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
ECOOPW
1999
Springer
15 years 8 months ago
Mutual Protection of Co-operating Agents
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we discuss protocols to improve agent security by distributing critical data and op...
Volker Roth
IPPS
2005
IEEE
15 years 10 months ago
Measuring Scalability of Resource Management Systems
Scalability refers to the extent of configuration modifications over which a system continues to be economically deployable. Until now, scalability of resource management system...
Arindam Mitra, Muthucumaru Maheswaran, Shoukat Ali
CORR
2008
Springer
103views Education» more  CORR 2008»
15 years 4 months ago
Core Persistence in Peer-to-Peer Systems: Relating Size to Lifetime
Distributed systems are now both very large and highly dynamic. Peer to peer overlay networks have been proved efficient to cope with this new deal that traditional approaches can ...
Vincent Gramoli, Anne-Marie Kermarrec, Achour Most...
IPPS
2005
IEEE
15 years 10 months ago
A Case Study on Pattern-Based Systems for High Performance Computational Biology
Computational biology research is now faced with the burgeoning number of genome data. The rigorous postprocessing of this data requires an increased role for high performance com...
Weiguo Liu, Bertil Schmidt