Sciweavers

450 search results - page 44 / 90
» Research on Security Architecture and Protocols of Grid Comp...
Sort
View
SIGCOMM
2009
ACM
14 years 5 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
GCC
2006
Springer
14 years 2 months ago
Decentralized Workflow Execution for Virtual Enterprises in Grid Environment
With the emergence of global market and virtual enterprises, coordination of business processes in dispersed organizations by distributed workflow execution will take on more impo...
Wei Tan, Yushun Fan
ESCIENCE
2007
IEEE
14 years 5 months ago
Building a Data Grid for the Australian Nanostructural Analysis Network
: This paper describes the architecture and services developed by the GRANI project for the Australian Nanostructural Analysis Network Organization (NANO). The aim of GRANI was to ...
Brendan Mauger, Jane Hunter, John Drennan, Ashley ...
SIGCOMM
2005
ACM
14 years 4 months ago
Declarative routing: extensible routing with declarative queries
The Internet’s core routing infrastructure, while arguably robust and efficient, has proven to be difficult to evolve to accommodate the needs of new applications. Prior researc...
Boon Thau Loo, Joseph M. Hellerstein, Ion Stoica, ...
CRYPTO
1987
Springer
87views Cryptology» more  CRYPTO 1987»
14 years 2 months ago
How to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
Maurice Herlihy, J. D. Tygar