Sciweavers

191 search results - page 20 / 39
» Building Intrusion-Tolerant Secure Software
Sort
View
EGC
2005
Springer
14 years 1 months ago
M-Grid: Using Ubiquitous Web Technologies to Create a Computational Grid
Abstract. There are many potential users and uses for grid computing. However, the concept of sharing computing resources excites security concerns and, whilst being powerful and f...
Robert John Walters, Stephen Crouch
SP
2002
IEEE
117views Security Privacy» more  SP 2002»
13 years 7 months ago
Grids: The top ten questions
The design and implementation of a national computing system and data grid has become a reachable goal from both the computer science and computational science point of view. A di...
Jennifer M. Schopf, Bill Nitzberg
OOPSLA
2010
Springer
13 years 6 months ago
The Tower of Babel did not fail
Fred Brooks’ retelling of the biblical story of the Tower of Babel offers many insights into what makes building software difficult. The difficulty, according to common interp...
Paul Adamczyk, Munawar Hafiz
EUROPKI
2005
Springer
14 years 1 months ago
CA-in-a-Box
An enterprise (such as an institute of higher education) wishing to deploy PKI must choose between several options, all expensive and awkward. It might outsource certification to ...
Mark Franklin, Kevin Mitcham, Sean W. Smith, Joshu...
KBSE
2003
IEEE
14 years 1 months ago
Automation for Exception Freedom Proofs
Run-time errors are typically seen as unacceptable within safety and security critical software. The SPARK approach to the development of high integrity software addresses the pro...
Bill J. Ellis, Andrew Ireland