Sciweavers

2927 search results - page 158 / 586
» Secure Distributed Human Computation
Sort
View
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
14 years 3 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
ESORICS
2008
Springer
13 years 11 months ago
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough
The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP...
Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X...
JOT
2006
80views more  JOT 2006»
13 years 9 months ago
Remote Job Submission Security
This paper presents the middleware needed to deploy jobs to non-geographically colocated clusters with decentralized look-up severs. We have named our framework the Initium Remote...
Pawel Krepsztul, Douglas A. Lyon
AINA
2005
IEEE
14 years 3 months ago
Implementation and Evaluation of a Java Based Computational Grid for Bioinformatics Applications
In the present study, THUBioGrid, an experimental distributed computing application for bioinformatics (BioGrid) is proposed. THUBioGrid incorporates directory services (data and ...
Chao-Tung Yang, Yi-Chun Hsiung, Heng-Chuan Kan
I3E
2003
133views Business» more  I3E 2003»
13 years 11 months ago
Inter-Organizational E-Services Accounting Management on Computational Grids
Abstract Accounting management is of strategic importance for a successful uptake of computational Grid technology within the user community. Computational Grid is one the most imp...
Franco Arcieri, Fabio Fioravanti, Enrico Nardelli,...