Sciweavers

333 search results - page 51 / 67
» Implementing a Prototype of the Security Framework for Distr...
Sort
View
IJHPCA
2002
101views more  IJHPCA 2002»
13 years 7 months ago
SCALA: A Performance System For Scalable Computing
Lack of effective performance-evaluation environments is a major barrier to the broader use of high performance computing. Conventional performance environments are based on profi...
Xian-He Sun, Thomas Fahringer, Mario Pantano
MIDDLEWARE
2004
Springer
14 years 28 days ago
On the benefits of decomposing policy engines into components
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. However, application developers and ...
Konstantin Beznosov
RBAC
1997
135views more  RBAC 1997»
13 years 9 months ago
Reconciling role based management and role based access control
Role Based Access Control is only a subset of the security management and distributed systems management. Yet, the characteristics and use of the role objects in RBAC or Role Base...
Emil Lupu, Morris Sloman
TSMC
2008
168views more  TSMC 2008»
13 years 7 months ago
Wise-ShopFloor: An Integrated Approach for Web-Based Collaborative Manufacturing
This paper presents an integrated approach for Web-based collaborative manufacturing, including distributed process planning, dynamic scheduling, real-time monitoring, and remote c...
Lihui Wang
EUROSYS
2010
ACM
14 years 19 days ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry