Sciweavers

661 search results - page 51 / 133
» Distributed and Secure Access Control in P2P Databases
Sort
View
APNOMS
2006
Springer
13 years 11 months ago
On the Security of Attribute Certificate Structuring for Highly Distributed Computing Environments
For an efficient role based access control using attribute certificate in highly distributed computing environments, we use a technique of structuring role specification certificat...
Soomi Yang
AINA
2009
IEEE
14 years 25 days ago
Location-Aware Authentication and Access Control
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Elisa Bertino, Michael S. Kirkpatrick
GRID
2006
Springer
13 years 7 months ago
Shibboleth-based Access to and Usage of Grid Resources
Security underpins Grids and e-Research. Without a robust, reliable and simple Grid security infrastructure combined with commonly accepted security practices, large portions of th...
Richard O. Sinnott, Jipu Jiang, J. P. Watt, Oluwaf...
ICDCIT
2004
Springer
14 years 1 months ago
Vulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
Bharat K. Bhargava, Leszek Lilien
ICDE
2005
IEEE
92views Database» more  ICDE 2005»
14 years 1 months ago
The Versioning System Balancing Data Amount and Access Frequency on Distributed Storage System
In this paper, a method of handling both access frequency skew and data amount skew on a distributed parallel storage system under version management system is discussed. We assum...
Mana Nakano, Dai Kobayashi, Akitsugu Watanabe, Tos...