Sciweavers

947 search results - page 182 / 190
» Provable Implementations of Security Protocols
Sort
View
JSW
2007
124views more  JSW 2007»
13 years 9 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon
CORR
2002
Springer
188views Education» more  CORR 2002»
13 years 9 months ago
GridBank: A Grid Accounting Services Architecture (GASA) for Distributed Systems Sharing and Integration
Computational Grids are emerging as a new infrastructure for Internet-based parallel and distributed computing. They enable the sharing, exchange, discovery, and aggregation of re...
Alexander Barmouta, Rajkumar Buyya
PC
2002
189views Management» more  PC 2002»
13 years 9 months ago
Data management and transfer in high-performance computational grid environments
An emerging class of data-intensive applications involve the geographically dispersed extraction of complex scientific information from very large collections of measured or compu...
William E. Allcock, Joseph Bester, John Bresnahan,...
PE
2007
Springer
154views Optimization» more  PE 2007»
13 years 9 months ago
QoS management in service-oriented architectures
The next generation of software systems will be highly distributed, component-based and service-oriented. They will need to operate in unattended mode and possibly in hostile envi...
Daniel A. Menascé, Honglei Ruan, Hassan Gom...
CCS
2004
ACM
14 years 3 months ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon