Sciweavers

579 search results - page 97 / 116
» Security Enforcement Model for Distributed Usage Control
Sort
View
EGC
2005
Springer
14 years 1 months ago
Mobile-to-Grid Middleware: Bridging the Gap Between Mobile and Grid Environments
Currently, access to Grid services is limited to resourceful devices such as desktop PCs but most mobile devices (with wireless network connections) cannot access the Grid network ...
Hassan Jameel, Umar Kalim, Ali Sajjad, Sungyoung L...
INFOCOM
2000
IEEE
13 years 11 months ago
A Modular Approach to Packet Classification: Algorithms and Results
The ability to classify packets according to pre-defined rules is critical to providing many sophisticated value-added services, such as security, QoS, load balancing, traffic acco...
Thomas Y. C. Woo
ISORC
2000
IEEE
14 years 1 days ago
Hybrid Sequence Charts
We introduce Hybrid Sequence Charts (HySCs) as a visual description technique for communication in hybrid system models. To that end, we adapt a subset of the well-known MSC synta...
Radu Grosu, Ingolf Krüger, Thomas Stauner
ACSAC
2009
IEEE
13 years 11 months ago
Justifying Integrity Using a Virtual Machine Verifier
Emerging distributed computing architectures, such as grid and cloud computing, depend on the high integrity execution of each system in the computation. While integrity measuremen...
Joshua Schiffman, Thomas Moyer, Christopher Shal, ...
OOPSLA
2004
Springer
14 years 1 months ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...