Sciweavers

2486 search results - page 53 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
BIOADIT
2004
Springer
14 years 2 months ago
Dynamic Self-Assembly and Computation: From Biological to Information Systems
We present two ways in which dynamic self-assembly can be used to perform computation, via stochastic protein networks and self-assembling software. We describe our protein-emulati...
Ann M. Bouchard, Gordon C. Osbourn
CIS
2005
Springer
14 years 2 months ago
Survivability Computation of Networked Information Systems
Abstract. Survivability should be considered beyond security for networked information systems, which emphasizes the ability of continuing providing services timely in malicious en...
Xuegang Lin, Rongsheng Xu, Miaoliang Zhu
DRM
2009
Springer
14 years 3 months ago
Videosurveillance and privacy: covering the two sides of the mirror with DRM
Privacy and security have always been key concerns for individuals. They have also been closely related concepts: in order to increase their perception of security, people sacriï¬...
Juan Ramón Troncoso-Pastoriza, Pedro Comesa...
CSREASAM
2006
13 years 10 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
GRID
2006
Springer
13 years 8 months ago
The Palantir Grid Meta-Information System
Grids allow large scale resource-sharing across different administrative domains. Those diverse resources are likely to join or quit the Grid at any moment or possibly to break dow...
Francesc Guim, Ivan Rodero, M. Tomas, Julita Corba...