Sciweavers

1627 search results - page 171 / 326
» On context in authorization policy
Sort
View
EGOV
2003
Springer
14 years 3 months ago
Local Democracy Shaping e-Democracy
This paper offers a fresh perspective to study the role and implications of information and communications technologies (ICT) in processes of local democracy. It moves away from ea...
Zahid Parvez
ESORICS
2003
Springer
14 years 3 months ago
Hardware Encapsulation of Security Services
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Adrian Baldwin, Simon Shiu
HPDC
2002
IEEE
14 years 3 months ago
Distributed Job Scheduling on Computational Grids Using Multiple Simultaneous Requests
Even though middleware support for grid computing has been the subject of extensive research, scheduling policies for the grid context have not been much studied. In addition to p...
Vijay Subramani, Rajkumar Kettimuthu, Srividya Sri...
VLDB
2001
ACM
131views Database» more  VLDB 2001»
14 years 2 months ago
Change-Centric Management of Versions in an XML Warehouse
: We present a change-centric method to manage versions in a Web WareHouse of XML data. The starting points is a sequence of snapshots of XML documents we obtain from the web. By r...
Amélie Marian, Serge Abiteboul, Gregory Cob...
SIGMETRICS
1999
ACM
14 years 2 months ago
Optimal Stochastic Scheduling in Multiclass Parallel Queues
In this paperweconsidertheproblemof schedulingdifferentclasses of customerson multiple distributed serversto minimize an objective function basedon per-classmeanresponsetimes.This...
Jay Sethuraman, Mark S. Squillante