Sciweavers

802 search results - page 97 / 161
» Security Policy Reconciliation in Distributed Computing Envi...
Sort
View
WPES
2006
ACM
14 years 4 months ago
Private social network analysis: how to assemble pieces of a graph privately
Connections in distributed systems, such as social networks, online communities or peer-to-peer networks, form complex graphs. These graphs are of interest to scientists in field...
Keith B. Frikken, Philippe Golle
JSAC
2011
142views more  JSAC 2011»
13 years 5 months ago
A Distributed Key Management Framework with Cooperative Message Authentication in VANETs
Abstract—In this paper, we propose a distributed key management framework based on group signature to provision privacy in vehicular ad hoc networks (VANETs). Distributed key man...
Yong Hao, Yu Cheng, Chi Zhou, Wei Song
IPPS
2007
IEEE
14 years 4 months ago
New Results on the Performance Effects of Autocorrelated Flows in Systems
Temporal dependence within the workload of any computing or networking system has been widely recognized as a significant factor affecting performance. More specifically, burstin...
Evgenia Smirni, Qi Zhang, Ningfang Mi, Alma Riska,...
MM
2000
ACM
99views Multimedia» more  MM 2000»
14 years 2 months ago
A generic late-join service for distributed interactive media
In this paper we present a generic late-join service for distributed interactive media, i.e., networked media which involve user interactions. Examples for distributed interactive...
Jürgen Vogel, Martin Mauve, Werner Geyer, Vol...
WETICE
1997
IEEE
14 years 2 months ago
How Role Based Access Control is Implemented in SESAME
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work ...
Mark Vandenwauver, René Govaerts, Joos Vand...