Anitya: An Ephemeral Data Management Service and Secure Data Access Protocols for Dynamic Collaborations
暂无分享,去创建一个
[1] Wei Sun,et al. CPU Load Predictions on the Computational Grid , 2006, CCGRID.
[2] M. Condell,et al. Multidimensional security policy management for dynamic coalitions , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[3] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[4] Radia Perlman,et al. The ephemerizer: making data disappear , 2005 .
[5] John Zic,et al. Enterprise Collaborative Contexts and their Provisioning for Secure Managed Extranets , 2006, 15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'06).
[6] Antony I. T. Rowstron,et al. PAST: a large-scale, persistent peer-to-peer storage utility , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[7] Juan Chen,et al. Improving a Local Learning Technique for QueueWait Time Predictions , 2006, Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06).
[8] Himanshu Khurana,et al. A model for access negotiations in dynamic coalitions , 2004, 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[9] Peter A. Dinda. Online Prediction of the Running Time of Tasks , 2004, Cluster Computing.
[10] Warren Smith,et al. Improving resource selection and scheduling using predictions , 2004 .
[11] T. C. Ting,et al. Information sharing and security in dynamic coalitions , 2002, SACMAT '02.
[12] Vijay Karamcheti,et al. dRBAC: distributed role-based access control for dynamic coalition environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[13] Ravi S. Sandhu,et al. Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.
[14] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[15] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.