Sciweavers

561 search results - page 18 / 113
» Remote Access Security Issues
Sort
View
SP
2005
IEEE
149views Security Privacy» more  SP 2005»
14 years 3 months ago
Distributed Proving in Access-Control Systems
We present a distributed algorithm for assembling a proof that a request satisfies an access-control policy expressed in a formal logic, in the tradition of Lampson et al. [16]. ...
Lujo Bauer, Scott Garriss, Michael K. Reiter
CCS
2011
ACM
12 years 9 months ago
Proofs of ownership in remote storage systems
Cloud storage systems are becoming increasingly popular. A promising technology that keeps their cost down is deduplication, which stores only a single copy of repeating data. Cli...
Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra...
AINA
2006
IEEE
14 years 3 months ago
A Bulk-retrieval Technique for Effective Remote Monitoring in a Mobile Environment
For effective management it is necessary to have methods by which management applications can periodically retrieve large volumes of information from network devices. In this work...
Glenn Mansfield Keeni, Kazuhide Koide, Takeo Saito...
HPDC
2007
IEEE
14 years 4 months ago
Direct-pNFS: scalable, transparent, and versatile access to parallel file systems
Grid computations require global access to massive data stores. To meet this need, the GridNFS project aims to provide scalable, high-performance, transparent, and secure wide-are...
Dean Hildebrand, Peter Honeyman
MSE
2003
IEEE
120views Hardware» more  MSE 2003»
14 years 3 months ago
A Collaborative Environment for Remote Experimentation
Embedded systems have become common place in industry and domestic electronics, resulting in the need for educational institutions to teach advanced embedded systems design. Exper...
Michael Callaghan, Jim Harkin, Chris Peters, T. Ma...