Sciweavers

262 search results - page 23 / 53
» Scalable and Secure Resource Location
Sort
View
VLDB
1998
ACM
116views Database» more  VLDB 1998»
13 years 12 months ago
The Heterogeneity Problem and Middleware Technology: Experiences with and Performance of Database Gateways
In this paper, we present the results that we have obtained by comparing and testing three well-known database middleware solutions. We have analyzed their features related to glo...
Fernando de Ferreira Rezende, Klaudia Hergula
ICSE
2008
IEEE-ACM
14 years 8 months ago
Developing a security protocol for a distributed decision support system in a healthcare environment
In this paper, we describe the unique security issues involved in healthcare domains. These have been addressed to the needs of the HealthAgents project. In the proposed approach,...
Liang Xiao 0002, Paul H. Lewis, Alex Gibb
ITRUST
2004
Springer
14 years 1 months ago
Towards Dynamic Security Perimeters for Virtual Collaborative Networks
Abstract The Internet provides a ubiquitous, standards-based substrate for global communications of all kinds. Rapid advances are now being made in agreeing protocols and machine-p...
Ivan Djordjevic, Theodosis Dimitrakos
EUROPAR
2007
Springer
13 years 9 months ago
Evaluation of a Utility Computing Model Based on the Federation of Grid Infrastructures
Utility computing is a service provisioning model which will provide adaptive, flexible and simple access to computing resources, enabling a pay-per-use model for computing simila...
Constantino Vázquez, Eduardo Huedo, Rub&eac...
LCPC
2005
Springer
14 years 1 months ago
Lightweight Monitoring of the Progress of Remotely Executing Computations
Abstract. The increased popularity of grid systems and cycle sharing across organizations requires scalable systems that provide facilities to locate resources, to be fair in the u...
Shuo Yang, Ali Raza Butt, Y. Charlie Hu, Samuel P....