Sciweavers

802 search results - page 64 / 161
» Security Policy Reconciliation in Distributed Computing Envi...
Sort
View
ICDCSW
2003
IEEE
14 years 2 months ago
Survivable Multi-Level Ad-Hoc Group Operations
In this paper we investigate the survivability of multilevel ad-hoc groups for critical operations through a case study. We aim to provide a formal trust framework for establishin...
Dan Zhou, Jie Wu
GCC
2005
Springer
14 years 2 months ago
XML-Based Digital Signature Accelerator in Open Mobile Grid Computing
As Grid technology evolves it is becoming evident that the inclusion of mobile devices in a Grid environment will benefit both the Grid and mobile network communities. Many mobile ...
Namje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Ki...
GRID
2004
Springer
14 years 2 months ago
Usage Policy-Based CPU Sharing in Virtual Organizations
Resource sharing within Grid collaborations usually implies specific sharing mechanisms at participating sites. Challenging policy issues can arise within virtual organizations (V...
Catalin Dumitrescu, Ian T. Foster
TRUST
2009
Springer
14 years 3 months ago
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...
POPL
2008
ACM
14 years 9 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk