Sciweavers

2927 search results - page 31 / 586
» Secure Distributed Human Computation
Sort
View
CHI
2008
ACM
14 years 8 months ago
Expandable grids for visualizing and authoring computer security policies
We introduce the Expandable Grid, a novel interaction technique for creating, editing, and viewing many types of security policies. Security policies, such as file permissions pol...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...
AIMS
2010
Springer
13 years 9 months ago
Towards Flexible and Secure Distributed Aggregation
Distributed aggregation algorithms are important in many present and future computing applications. However, after a decade of research, there are still numerous open questions reg...
Kristján Valur Jónsson, Mads F. Dam
CSREASAM
2003
13 years 9 months ago
Developing Secure Web Services for Computational Portals
Computational web portals provide uniform access to remote computational resources--hardware, software, and data--by hiding the complexity of the heterogeneous, distributed, high ...
Choon-Han Youn, Marlon E. Pierce, Geoffrey Fox
ESCIENCE
2006
IEEE
13 years 11 months ago
A Collaborative Virtual Computer Security Lab
The necessity of a lab course on computer security arises from the students' need to complement course work by hands-on experience. In order to meet the distance teaching dem...
Jörg Keller, Ralf Naues
GCA
2009
13 years 5 months ago
Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation
This paper highlights the need to meet both Grid user and resource provider security requirements, describing the rationale for securing Grid workflows: a set of tasks arranged int...
Po-Wah Yau, Allan Tomlinson