Sciweavers

1484 search results - page 244 / 297
» Security policies for downgrading
Sort
View
EUROMICRO
2006
IEEE
14 years 2 months ago
BGP-like TE Capabilities for SHIM6
In this paper we present a comprehensive set of mechanisms that restore to the site administrator the capacity of enforcing Traffic Engineering (TE) policies in a multiaddressed I...
Marcelo Bagnulo, Alberto García-Martí...
WIKIS
2005
ACM
14 years 2 months ago
SmallWiki: a meta-described collaborative content management system
Wikis are often implemented using string-based approaches to parse and generate their pages. While such approaches work well for simple wikis, they hamper the customization and ad...
Stéphane Ducasse, Lukas Renggli, Roel Wuyts
SAG
2004
Springer
14 years 1 months ago
A Proxy Service for the xrootd Data Server
In data intensive sciences like High Energy Physics, large amounts of data are typically distributed and/or replicated to several sites. Although there exist various ways to store...
Andrew Hanushevsky, Heinz Stockinger
ICALP
2003
Springer
14 years 1 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
ICALP
2003
Springer
14 years 1 months ago
Resource Access and Mobility Control with Dynamic Privileges Acquisition
µKlaim is a process language that permits programming distributed systems made up of several mobile components interacting through multiple distributed tuple spaces. We present th...
Daniele Gorla, Rosario Pugliese