Sciweavers

762 search results - page 19 / 153
» Security Contexts in Autonomic Systems
Sort
View
ICAC
2006
IEEE
14 years 3 months ago
The Laundromat Model for Autonomic Cluster Computing
Traditional High Performance Computing systems require extensive management and suffer from security and configuration problems. This paper presents a new clustermanagement syste...
Jacob Gorm Hansen, Eske Christiansen, Eric Jul
ICAS
2006
IEEE
157views Robotics» more  ICAS 2006»
14 years 3 months ago
Adaptive provisioning using virtual machines and autonomous role-based management
A modern server system must deliver a complex set of obligations towards its users. We study the concept of roles as autonomous encapsulations of a set of promises. Using virtuali...
Kyrre M. Begnum, Mark Burgess, John A. Sechrest
ICAC
2005
IEEE
14 years 3 months ago
Towards Autonomic Virtual Applications in the In-VIGO System
Grid environments enable users to share non-dedicated resources that lack performance guarantees. This paper describes the design of application-centric middleware components to a...
Jing Xu, Sumalatha Adabala, José A. B. Fort...
AISM
2004
13 years 11 months ago
An Examination of the Security of Routing Protocol Updates
The exchange of routing protocol updates is used to ensure that routers using an Internal Gateway Protocol (IGP) in an Autonomous System (AS), or routers using an External Gateway...
G. Murphy
ENTCS
2006
173views more  ENTCS 2006»
13 years 9 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin