An Access Control Model for Secure Cluster-Computing Environments.
Wei LiEdward B. AllenPublished in: HICSS (2005)
Keyphrases
- computing environments
- group communication
- trusted computing
- mobile computing
- clustering algorithm
- service discovery
- mobile environments
- grid computing
- security requirements
- low bandwidth
- mobile agents
- hierarchical clustering
- key management
- pervasive computing
- data clustering
- fault tolerance
- data dissemination
- mobile clients