Sciweavers

163 search results - page 23 / 33
» What Instills Trust
Sort
View
ESCIENCE
2006
IEEE
13 years 11 months ago
Authorizing Remote Job Execution Based on Job Properties
: E-Science often requires access to remote Grid computing platforms. Current authorization systems on these remote systems have largely based decisions solely on the identity of t...
Sang-Min Park, Glenn S. Wasson, Marty Humphrey
GECON
2008
Springer
121views Business» more  GECON 2008»
13 years 8 months ago
Monitoring and Reputation Mechanisms for Service Level Agreements
A Service Level Agreement (SLA) is an electronic contract between a service user and a provider, and specifies the service to be provided, Quality of Service (QoS) properties that...
Omer F. Rana, Martijn Warnier, Thomas B. Quillinan...
WWW
2008
ACM
14 years 8 months ago
Setting Access Permission through Transitive Relationship in Web-based Social Networks
The rising popularity of Web 2.0, such as blogs, forums, online calendars/diaries, etc., makes users more interested in keeping their data on the Web. Sharing of such data could m...
Dan Hong, Vincent Y. Shen
SIGMOD
2010
ACM
170views Database» more  SIGMOD 2010»
14 years 6 days ago
Querying data provenance
Many advanced data management operations (e.g., incremental maintenance, trust assessment, debugging schema mappings, keyword search over databases, or query answering in probabil...
Grigoris Karvounarakis, Zachary G. Ives, Val Tanne...
ACSAC
2005
IEEE
14 years 1 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger