Sciweavers

802 search results - page 57 / 161
» Security Policy Reconciliation in Distributed Computing Envi...
Sort
View
CLUSTER
2008
IEEE
13 years 9 months ago
Translating Service Level Objectives to lower level policies for multi-tier services
Service providers and their customers agree on certain quality of service guarantees through Service Level Agreements (SLA). An SLA contains one or more Service Level Objectives (S...
Yuan Chen, Subu Iyer, Xue Liu, Dejan S. Milojicic,...
IJKESDP
2010
94views more  IJKESDP 2010»
13 years 6 months ago
Rule acquisition for cognitive agents by using estimation of distribution algorithms
Cognitive Agents must be able to decide their actions based on their recognized states. In general, learning mechanisms are equipped for such agents in order to realize intellgent ...
Tokue Nishimura, Hisashi Handa
CCGRID
2006
IEEE
14 years 3 months ago
Nova: An Approach to On-Demand Virtual Execution Environments for Grids
This paper attempts to reduce the overheads of dynamically creating and destroying the virtual environments for secure job execution. It broaches a grid architecture which we call...
Srikanth Sundarrajan, Hariprasad Nellitheertha, Su...
CCS
2008
ACM
13 years 11 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
SWS
2004
ACM
14 years 2 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton