Sciweavers

287 search results - page 50 / 58
» A Foundation for Defining Security Requirements in Grid Comp...
Sort
View
CCGRID
2002
IEEE
15 years 9 months ago
NEVRLATE: Scalable Resource Discovery
A scalable and expressive peer-to-peer (P2P) networking and computing framework requires efficient resource discovery services. Here we propose NEVRLATE, for Network-Efficient V...
Ajay Chander, Steven Dawson, Patrick Lincoln, Davi...
135
Voted
ICICS
2009
Springer
15 years 2 months ago
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model
The Trusted Computing Group (TCG) proposed remote attestation as a solution for establishing trust among distributed applications. However, current TCG attestation architecture req...
Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei S...
191
Voted
ESOP
2005
Springer
15 years 10 months ago
Asserting Bytecode Safety
Abstract. We instantiate an Isabelle/HOL framework for proof carrying code to Jinja bytecode, a downsized variant of Java bytecode featuring objects, inheritance, method calls and ...
Martin Wildmoser, Tobias Nipkow
ICSOC
2003
Springer
15 years 9 months ago
PANDA: Specifying Policies for Automated Negotiations of Service Contracts
Abstract. The Web and Grid services frameworks provide a promising infrastructure for cross-organizational use of online services. The use of services in large-scale and cross-orga...
Henner Gimpel, Heiko Ludwig, Asit Dan, Robert Kear...
SIGOPSE
1998
ACM
15 years 8 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau