Sciweavers

2814 search results - page 104 / 563
» Can We Make Operating Systems Reliable and Secure
Sort
View
FC
2005
Springer
98views Cryptology» more  FC 2005»
15 years 10 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...
ISPDC
2003
IEEE
15 years 10 months ago
Lightweight Logging and Recovery for Distributed Shared Memory over Virtual Interface Architecture
As software Distributed Shared Memory(DSM) systems become attractive on larger clusters, the focus of attention moves toward improving the reliability of systems. In this paper, w...
Soyeon Park, Youngjae Kim, Seung Ryoul Maeng
IEEEARES
2006
IEEE
15 years 10 months ago
Modeling Dependable Systems using Hybrid Bayesian Networks
A hybrid Bayesian Network (BN) is one that incorporates both discrete and continuous nodes. In our extensive applications of BNs for system dependability assessment the models are...
Martin Neil, Manesh Tailor, Norman E. Fenton, Davi...
PERCOM
2005
ACM
16 years 4 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
HICSS
2008
IEEE
105views Biometrics» more  HICSS 2008»
15 years 4 months ago
Evaluating the Effect of Upgrade, Control and Development Strategies on Robustness and Failure Risk of the Power Transmission Gr
We use the OPA complex systems model of the power transmission system to investigate the effect of a series of different network upgrade scenarios on the long time dynamics and th...
David E. Newman, Benjamin A. Carreras, Vickie E. L...