Scheduling execution of credentials in constrained secure environments.
Jan-Erik EkbergN. AsokanKari KostiainenAarne RantalaPublished in: STC (2008)
Keyphrases
- computational grids
- highly dynamic environments
- scheduling problem
- scheduling algorithm
- resource allocation
- resource constraints
- timing constraints
- resource consumption
- cryptographic protocols
- execution model
- user privacy
- deadlock free
- real world
- concurrent execution
- security mechanisms
- single machine
- lightweight
- dynamic environments
- access control