Sciweavers

88 search results - page 14 / 18
» acsw 2007
Sort
View
ACSW
2006
13 years 10 months ago
A method for access authorisation through delegation networks
Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for e...
Audun Jøsang, Dieter Gollmann, Richard Au
ACSW
2006
13 years 10 months ago
Key research issues in grid workflow verification and validation
In the grid architecture, a grid workflow system is a type of high-level grid middleware which is supposed to support modelling, redesign and execution of large-scale sophisticate...
Jinjun Chen, Yun Yang
ACSW
2006
13 years 10 months ago
Improving resource utilisation in market oriented grid management and scheduling
Service providers of the future could dynamically negotiate for, and create their infrastructure on Grid based utility computing and communication providers. Such commercialisatio...
Kris Bubendorfer
ACSW
2006
13 years 10 months ago
Formal analysis of secure contracting protocol for e-tendering
Formal specification and verification of protocols have been credited for uncovering protocol flaws; revealing inadequacies in protocol design of the Initial Stage and Negotiation...
Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond...
ACSW
2006
13 years 10 months ago
Toward building grid applications in bioinformatics
In silico bioinformatics experiments involve integration of and access to computational tools and biological databases. The emerging grid computing technologies enable bioinformat...
Xiujun Gong, Kensuke Nakamura, Kei Yura, Nobuhiro ...