For an efficient role based access control using attribute certificate in highly distributed computing environments, we use a technique of structuring role specification certificat...
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Security underpins Grids and e-Research. Without a robust, reliable and simple Grid security infrastructure combined with commonly accepted security practices, large portions of th...
Richard O. Sinnott, Jipu Jiang, J. P. Watt, Oluwaf...
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
In this paper, a method of handling both access frequency skew and data amount skew on a distributed parallel storage system under version management system is discussed. We assum...
Mana Nakano, Dai Kobayashi, Akitsugu Watanabe, Tos...