Sciweavers

443 search results - page 46 / 89
» Dynamic Authorization and Intrusion Response in Distributed ...
Sort
View
COLCOM
2007
IEEE
14 years 2 months ago
Towards trust-aware access management for ad-hoc collaborations
—In an ad-hoc collaborative sharing environment, attribute-based access control provides a promising approach in defining authorization over shared resources based on users’ p...
Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin H...
CCS
2007
ACM
14 years 2 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
CONCURRENCY
2008
102views more  CONCURRENCY 2008»
13 years 8 months ago
Dynamic data replication in LCG 2008
To provide performant access to data from high energy physics experiments such as the Large Hadron Collider (LHC), controlled replication of files among grid sites is required. Dy...
Caitriana Nicholson, David G. Cameron, A. T. Doyle...
SBBD
2004
128views Database» more  SBBD 2004»
13 years 9 months ago
Integrating Heterogeneous Data Sources in Flexible and Dynamic Environments
Flexible and dynamic environments are characterized by high independence from connection participants, low control over available services and high tolerance to communication fail...
Angelo Brayner, Marcelo Meirelles
TES
2001
Springer
14 years 14 days ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...