Abstract. There are many potential users and uses for grid computing. However, the concept of sharing computing resources excites security concerns and, whilst being powerful and f...
The design and implementation of a national computing system and data grid has become a reachable goal from both the computer science and computational science point of view. A di...
Fred Brooks’ retelling of the biblical story of the Tower of Babel offers many insights into what makes building software difficult. The difficulty, according to common interp...
An enterprise (such as an institute of higher education) wishing to deploy PKI must choose between several options, all expensive and awkward. It might outsource certification to ...
Mark Franklin, Kevin Mitcham, Sean W. Smith, Joshu...
Run-time errors are typically seen as unacceptable within safety and security critical software. The SPARK approach to the development of high integrity software addresses the pro...