Sciweavers

4 search results - page 1 / 1
» A Comparison of Market Approaches to Software Vulnerability ...
Sort
View
ETRICS
2006
14 years 2 months ago
A Comparison of Market Approaches to Software Vulnerability Disclosure
Abstract. Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although ...
Rainer Böhme
USS
2010
13 years 8 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
MA
2000
Springer
114views Communications» more  MA 2000»
14 years 2 months ago
Saving Energy and Providing Value Added Services in Intelligent Buildings: A MAS Approach
In a de-regulated market the distribution utilities will compete with added value for the customer in addition to the delivery of energy. We describe a system consisting of a colle...
Paul Davidsson, Magnus Boman
BTW
2007
Springer
164views Database» more  BTW 2007»
14 years 5 months ago
Ruminations on Multi-Tenant Databases
: This is a position paper on multi-tenant databases. As motivation, it first describes the emerging marketplace of hosted enterprise services and the importance of using multi-ten...
Dean Jacobs, Stefan Aulbach