Sciweavers

1848 search results - page 332 / 370
» A Question Answering System for the Operation of Software Ap...
Sort
View
SC
2005
ACM
14 years 1 months ago
Identity Boxing: A New Technique for Consistent Global Identity
Today, users of the grid may easily authenticate themselves to computing resources around the world using a public key security infrastructure. However, users are forced to employ...
Douglas Thain
NDSS
2003
IEEE
14 years 1 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
ACSAC
2002
IEEE
14 years 21 days ago
Thirty Years Later: Lessons from the Multics Security Evaluation
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
Paul A. Karger, Roger R. Schell
WETICE
2002
IEEE
14 years 19 days ago
A Flexible Architecture for Collaborative Browsing
Collaborative Browsing is a new and promising research area whose purpose is to provide new collaboration schemes among users browsing the Web. To become an efficient collaboratio...
Guillermo de Jesús Hoyos-Rivera, Roberta Li...
OOPSLA
1998
Springer
13 years 12 months ago
JRes: A Resource Accounting Interface for Java
With the spread of the Internet the computing model on server systems is undergoing several important changes. Recent research ideas concerning dynamic operating system extensibil...
Grzegorz Czajkowski, Thorsten von Eicken