Sciweavers

391 search results - page 68 / 79
» Attack-Resistance of Computational Trust Models
Sort
View
IPPS
2007
IEEE
14 years 2 months ago
Towards A Better Understanding of Workload Dynamics on Data-Intensive Clusters and Grids
This paper presents a comprehensive statistical analysis of workloads collected on data-intensive clusters and Grids. The analysis is conducted at different levels, including Virt...
Hui Li, Lex Wolters
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
14 years 2 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
FIDJI
2004
Springer
14 years 1 months ago
Task-Based Access Control for Virtual Organizations
Abstract. GOLD (Grid-based Information Models to Support the Rapid Innovation of New High Value-Added Chemicals) is concerned with the dynamic formation and management of virtual o...
Panos Periorellis, Savas Parastatidis
ACMICEC
2006
ACM
111views ECommerce» more  ACMICEC 2006»
13 years 12 months ago
Passive verification of the strategyproofness of mechanisms in open environments
Consider an open infrastructure in which anyone can deploy mechanisms to support automated decision making and coordination amongst self-interested computational agents. Strategyp...
Laura Kang, David C. Parkes
TIC
2000
Springer
110views System Software» more  TIC 2000»
13 years 11 months ago
Safe and Flexible Dynamic Linking of Native Code
Abstract. We present the design and implementation of the first complete framework for flexible and safe dynamic linking of native code. Our approach extends Typed Assembly Languag...
Michael W. Hicks, Stephanie Weirich, Karl Crary