Sciweavers

802 search results - page 15 / 161
» Security Policy Reconciliation in Distributed Computing Envi...
Sort
View
CCS
2005
ACM
14 years 1 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
CCGRID
2006
IEEE
14 years 1 months ago
Policy-Based Access Control Framework for Grid Computing
Grid technology enables access and sharing of data and computational resources across administrative domains. Thus, it is important to provide a uniform access and management mech...
Jin Wu, Chokchai Leangsuksun, Vishal Rampure, Hong...
SGAI
2007
Springer
14 years 1 months ago
Expressive security policy rules using Layered Conceptual Graphs
A method must be provided to support the analysis of security policy rules interdependencies in a (possibly distributed) environment. We propose a Conceptual Graphs based language...
Madalina Croitoru, Liang Xiao 0002, David Dupplaw,...
ICA3PP
2010
Springer
14 years 14 days ago
Adapting Market-Oriented Scheduling Policies for Cloud Computing
Abstract. Provisioning extra resources is necessary when the local resources are not sufficient to meet the user requirements. Commercial Cloud providers offer the extra resources...
Mohsen Amini Salehi, Rajkumar Buyya
WISEC
2010
ACM
14 years 29 days ago
Privacy-preserving computation of benchmarks on item-level data using RFID
Currently, companies are about to optimize their internal processes by monitoring items they handle with Radio Frequency Identification (RFID). However, there is a risk that sens...
Florian Kerschbaum, Nina Oertel, Leonardo Weiss Fe...