Sciweavers

788 search results - page 87 / 158
» Secure Data Objects Replication in Data Grid
Sort
View
CCGRID
2005
IEEE
14 years 1 months ago
Bootstrapping to a semantic grid
The Scientific Annotation Middleware (SAM) is a set of components and services that enable researchers, applications, problem solving environments (PSE) and software agents to cre...
Jens Schwidder, Tara D. Talbott, James D. Myers
OSDI
2006
ACM
14 years 8 months ago
Ceph: A Scalable, High-Performance Distributed File System
We have developed Ceph, a distributed file system that provides excellent performance, reliability, and scalability. Ceph maximizes the separation between data and metadata manage...
Sage A. Weil, Scott A. Brandt, Ethan L. Miller, Da...
ISSA
2004
13 years 9 months ago
A General Methodology For The Development Of An Effective Information Security Policy
In today's hi-tech world, conventional physical security methods are simply insufficient for the protection of an organisation's information assets. This is because of t...
Arvish Ramdeyal
ACISP
2001
Springer
14 years 13 days ago
Private Information Retrieval Based on the Subgroup Membership Problem
Abstract. Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the subgroup membership problem. We then apply...
Akihiro Yamamura, Taiichi Saito
SAC
2002
ACM
13 years 7 months ago
A comprehensive model for arbitrary result extraction
Within the realms of workflow management and grid computing, scheduling of distributed services is a central issue. Most schedulers balance time and cost to fit within a client�...
Neal Sample, Dorothea Beringer, Gio Wiederhold