Sciweavers

897 search results - page 109 / 180
» Security Requirements for RFID Computing Systems
Sort
View
PDPTA
2004
13 years 9 months ago
An Integrated Global Service for File Transfer and Management in a Network (FTM)
The management and access of distributed informational resources has emerged as an important requirement for scientific simulations using high-performance computing facilities. Bot...
Jim Almond, Peggy Lindner
CCS
2008
ACM
13 years 10 months ago
Efficiently tracking application interactions using lightweight virtualization
In this paper, we propose a general-purpose framework that harnesses the power of lightweight virtualization to track applications interactions in a scalable an efficient manner. ...
Yih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil ...
EWSA
2004
Springer
14 years 1 months ago
An Architecture Description Language for Mobile Distributed Systems
Mobile software applications have to meet new requirements directly arising from mobility issues. To address these requirements at an early stage in development, an architecture d...
Volker Gruhn, Clemens Schäfer
IEEEARES
2007
IEEE
14 years 2 months ago
Reputation Management Survey
Electronic markets, distributed peer-to-peer applications and other forms of online collaboration are all based on mutual trust, which enables transacting peers to overcome the un...
Sini Ruohomaa, Lea Kutvonen, Eleni Koutrouli
ESORICS
2007
Springer
14 years 2 months ago
Incorporating Temporal Capabilities in Existing Key Management Schemes
The problem of key management in access hierarchies studies ways to assign keys to users and classes such that each user, after receiving her secret key(s), is able to independentl...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...