Sciweavers

5665 search results - page 256 / 1133
» Introduction to Computer Security
Sort
View
I3E
2003
133views Business» more  I3E 2003»
14 years 3 days ago
Inter-Organizational E-Services Accounting Management on Computational Grids
Abstract Accounting management is of strategic importance for a successful uptake of computational Grid technology within the user community. Computational Grid is one the most imp...
Franco Arcieri, Fabio Fioravanti, Enrico Nardelli,...
PERCOM
2006
ACM
13 years 10 months ago
Embedding expression: Pervasive computing architecture for art and entertainment
Pervasive computing's historical driver applications include environmental monitoring, safety and security, home and office productivity and guided experience of cultural act...
Jeff Burke, Jonathan Friedman, Eitan Mendelowitz, ...
AINA
2007
IEEE
14 years 5 months ago
A Context-Based Delegation Access Control Model for Pervasive Computing
This paper presents an architectural model for contextual-based delegation access control for pervasive computing, particularly access control mechanisms for ad hoc coalition scen...
Ramiro Liscano, Kaining Wang
CIS
2005
Springer
14 years 4 months ago
Survivability Computation of Networked Information Systems
Abstract. Survivability should be considered beyond security for networked information systems, which emphasizes the ability of continuing providing services timely in malicious en...
Xuegang Lin, Rongsheng Xu, Miaoliang Zhu
SBACPAD
2004
IEEE
93views Hardware» more  SBACPAD 2004»
14 years 3 days ago
FlowCert : Probabilistic Certification for Peer-to-Peer Computations
Large scale cluster, Peer-to-Peer computing systems and grid computer systems gather thousands of nodes for computing parallel applications. At this scale, it raises the problem o...
Sébastien Varrette, Jean-Louis Roch, Franck...