Sciweavers

250 search results - page 41 / 50
» Automatically constructing trusted cluster computing environ...
Sort
View
POLICY
2007
Springer
14 years 25 days ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell
PLDI
2010
ACM
13 years 10 months ago
Bringing Extensibility to Verified Compilers
Verified compilers, such as Leroy's CompCert, are accompanied by a fully checked correctness proof. Both the compiler and proof are often constructed with an interactive proo...
Zachary Tatlock, Sorin Lerner
HPDC
2003
IEEE
14 years 12 hour ago
Using Views for Customizing Reusable Components in Component-Based Frameworks
Increasingly, scalable distributed applications are being constructed by integrating reusable components spanning multiple administrative domains. Dynamic composition and deployme...
Anca-Andreea Ivan, Vijay Karamcheti
DSN
2008
IEEE
14 years 1 months ago
Automated duplicate detection for bug tracking systems
Bug tracking systems are important tools that guide the maintenance activities of software developers. The utility of these systems is hampered by an excessive number of duplicate...
Nicholas Jalbert, Westley Weimer
DEBS
2010
ACM
13 years 10 months ago
Quilt: a patchwork of multicast regions
Network bottlenecks, firewalls, restrictions on IP Multicast availability and administrative policies have long prevented the use of multicast even where the fit seems obvious. ...
Qi Huang, Ymir Vigfusson, Ken Birman, Haoyuan Li