Sciweavers

2187 search results - page 344 / 438
» Providing Security Services in a Resource Discovery System
Sort
View
LISA
1994
13 years 10 months ago
The Group Administration Shell and the GASH Network Computing Environment
Managing large scale UNIX networks so that users can use resources on multiple systems is traditionally performed using NIS, NFS, and DNS. Proper use of these tools requires exact...
Jonathan Abbey
ER
2004
Springer
169views Database» more  ER 2004»
14 years 2 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
SIGCOMM
2009
ACM
14 years 3 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
ATC
2009
Springer
14 years 3 months ago
Management without (Detailed) Models
We present a resource management algorithm based upon guided “walks” within a system state space. Walks are guided via simple predictions of optimum behavior whose accuracy inc...
Alva L. Couch, Mark Burgess, Marc Chiarini
EUROPAR
2009
Springer
14 years 1 months ago
Dynamic Virtual Cluster Reconfiguration for Efficient IaaS Provisioning
Abstract. Cloud computing is an emerging paradigm to provide Infrastructure as a Service (IaaS). In this paper we present NEPTUNE-IaaS, a software system able to support the whole ...
Vittorio Manetti, Pasquale Di Gennaro, Roberto Bif...