Sciweavers

219 search results - page 28 / 44
» Privacy in Distributed Meeting Scheduling
Sort
View
CCS
2009
ACM
14 years 1 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
ACSAC
2000
IEEE
13 years 11 months ago
Secure Smart Homes using Jini and UIUC SESAME
In this paper, we discuss our approach to constructing a dynamic and secure “Smart Home” environment and tackling the challenges associated with it. We envision a Smart Home a...
Jalal Al-Muhtadi, Manish Anand, M. Dennis Mickunas...
CCS
2006
ACM
13 years 10 months ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
GRID
2004
Springer
14 years 4 days ago
Parallel and Distributed Astronomical Data Analysis on Grid Datafarm
A comprehensive study of the whole petabyte-scale archival data of astronomical observatories has a possibility of new science and new knowledge in the field, while it was not fe...
Naotaka Yamamoto, Osamu Tatebe, Satoshi Sekiguchi
ASPDAC
2007
ACM
120views Hardware» more  ASPDAC 2007»
13 years 10 months ago
Integrating Power Management into Distributed Real-time Systems at Very Low Implementation Cost
The development cost of low-power embedded systems can be significantly reduced by reusing legacy designs and applying proper modifications to meet the new power constraints. The ...
Bita Gorjiara, Nader Bagherzadeh, Pai H. Chou