Sciweavers

802 search results - page 45 / 161
» Security Policy Reconciliation in Distributed Computing Envi...
Sort
View
FTDCS
1997
IEEE
14 years 1 months ago
Intrusion ripple analysis in distributed information systems
: Security is a very important aspect of distributed computing systems, especially in distributed information environments involving widearea networks, such as internets. In this p...
S. S. Yau, Jun Zhu
CCS
2007
ACM
14 years 3 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
AIPS
2008
13 years 11 months ago
Criticality Metrics for Distributed Plan and Schedule Management
We address the problem of coordinating the plans and schedules for a team of agents in an uncertain and dynamic environment. Bounded rationality, bounded communication, subjectivi...
Rajiv T. Maheswaran, Pedro A. Szekely
SOSP
2003
ACM
14 years 5 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
SEC
2007
13 years 10 months ago
Extending Role Based Access Control Model for Distributed Multidomain Applications
This paper presents the results related to the development of a flexible domain-based access control infrastructure for distributed Grid-based Collaborative Environments and Comple...
Yuri Demchenko, Leon Gommans, Cees de Laat