Sciweavers

94 search results - page 9 / 19
» Single Sign-On and the System Administrator
Sort
View
PERCOM
2006
ACM
14 years 7 months ago
Ordering Management Actions in Pervasive Systems using Specification-enhanced Policies
A pervasive system features a plethora of devices, services and applications organized as a large distributed system. One approach to managing such systems is by policies where ad...
Chetan Shiva Shankar, Roy H. Campbell
LISA
2003
13 years 8 months ago
Preventing Wheel Reinvention: The psgconf System Configuration Framework
Most existing Unix system configuration tools are designed monolithically. Each tool stores configuration data in its own way, has its own mechanism for enforcing policy, has a fi...
Mark D. Roth
ACMICEC
2003
ACM
113views ECommerce» more  ACMICEC 2003»
14 years 20 days ago
PayCash: a secure efficient Internet payment system
This paper describes PayCash, an Internet payment system that was designed to offer strong security and privacy protection. This system is based on the concept of electronic cash,...
Jon M. Peha, Ildar M. Khamitov
IJHPCA
2006
77views more  IJHPCA 2006»
13 years 7 months ago
An Interoperability Approach to System Software, Tools, and Libraries for Clusters
Systems software for clusters typically derives from a multiplicity of sources: the kernel itself, software associated with a particular distribution, site-specific purchased or o...
Ewing L. Lusk, Narayan Desai, Rick Bradshaw, Andre...
SC
2005
ACM
14 years 29 days ago
Separating Abstractions from Resources in a Tactical Storage System
ng Abstractions from Resources in a Tactical Storage System Douglas Thain† , Sander Klous∗ , Justin Wozniak† , Paul Brenner† , Aaron Striegel† , Jesus Izaguirre† † - ...
Douglas Thain, Sander Klous, Justin M. Wozniak, Pa...