Sciweavers

2421 search results - page 352 / 485
» Message from the Editor-in-Chief
Sort
View
POLICY
2007
Springer
14 years 4 months ago
Policy-Driven Negotiation for Authorization in the Grid
In many Grid services deployments, the clients and servers reside in different administrative domains. Hence, there is a requirement both to discover each other’s authorization ...
Ionut Constandache, Daniel Olmedilla, Frank Sieben...
SAFECOMP
2007
Springer
14 years 4 months ago
Experimental Evaluation of the DECOS Fault-Tolerant Communication Layer
This paper presents an experimental evaluation of the fault-tolerant communication (FTCOM) layer of the DECOS integrated architecture. The FTCOM layer implements different agreemen...
Jonny Vinter, Henrik Eriksson, Astrit Ademaj, Bern...
SARA
2007
Springer
14 years 4 months ago
Boosting MUS Extraction
Abstract. If a CSP instance has no solution, it contains a smaller unsolvable subproblem that makes unsolvable the whole problem. When solving such instance, instead of just return...
Santiago Macho González, Pedro Meseguer
TCC
2007
Springer
114views Cryptology» more  TCC 2007»
14 years 4 months ago
Multi-authority Attribute Based Encryption
Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
Melissa Chase
VLDB
2007
ACM
135views Database» more  VLDB 2007»
14 years 4 months ago
Self-Organizing Schema Mappings in the GridVine Peer Data Management System
GridVine is a Peer Data Management System based on a decentralized access structure. Built following the principle of data independence, it separates a logical layer – where dat...
Philippe Cudré-Mauroux, Suchit Agarwal, Adr...