Sciweavers

5123 search results - page 134 / 1025
» Performance and Security Tradeoff
Sort
View
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
15 years 9 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speci...
William R. Marczak, Shan Shan Huang, Martin Braven...
INFOCOM
2011
IEEE
14 years 8 months ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang
ESEM
2009
ACM
15 years 11 months ago
Using security metrics coupled with predictive modeling and simulation to assess security processes
: © Using Security Metrics Coupled with Predictive Modeling and Simulation to Assess Security Processes Yolanta Beres, Marco Casassa Mont, Jonathan Griffin, Simon Shiu HP Laborato...
Yolanta Beres, Marco Casassa Mont, Jonathan Griffi...
ISCC
2002
IEEE
121views Communications» more  ISCC 2002»
15 years 9 months ago
Towards a hybrid network model for wireless packet data networks
In this paper we study the performance trade-offs between conventional cellular and ad-hoc peer-to-peer wireless networks. We compare through simulations the performance of the tw...
Hung-Yun Hsieh, Raghupathy Sivakumar
JPDC
2006
112views more  JPDC 2006»
15 years 4 months ago
CEFT: A cost-effective, fault-tolerant parallel virtual file system
The vulnerability of computer nodes due to component failures is a critical issue for cluster-based file systems. This paper studies the development and deployment of mirroring in...
Yifeng Zhu, Hong Jiang