Sciweavers

754 search results - page 104 / 151
» Can self-managed systems be trusted
Sort
View
ESOP
2005
Springer
14 years 3 months ago
Asserting Bytecode Safety
Abstract. We instantiate an Isabelle/HOL framework for proof carrying code to Jinja bytecode, a downsized variant of Java bytecode featuring objects, inheritance, method calls and ...
Martin Wildmoser, Tobias Nipkow
JITECH
2007
136views more  JITECH 2007»
13 years 10 months ago
A computer scientist's reactions to NPfIT
This paper contains a set of personal views relating to NHS Connecting for Health’s National Programme for IT (NPfIT), and in particular its Care Records Service, written from t...
Brian Randell
ACSAC
2009
IEEE
14 years 2 months ago
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
Audit logs, providing information about the current and past states of systems, are one of the most important parts of modern computer systems. Providing security for audit logs on...
Attila Altay Yavuz, Peng Ning
JITECH
2007
220views more  JITECH 2007»
13 years 10 months ago
Fixing the payment system at Alvalade XXI: a case on IT project risk management
This case describes the implementation and subsequent failure of an innovative system installed in the bars of Alvalade XXI, the recently built football stadium in Lisbon, Portuga...
Ramon O'Callaghan
SIGOPSE
1998
ACM
14 years 2 months ago
Distributed virtual machines: a system architecture for network computing
Modern virtual machines, such as Java and Inferno, are emerging as network computing s. While these virtual machines provide higher-level abstractions and more sophisticated servi...
Emin Gün Sirer, Robert Grimm, Brian N. Bersha...