Sciweavers

8655 search results - page 87 / 1731
» Challenges for Trusted Computing
Sort
View
SCAM
2005
IEEE
14 years 2 months ago
Static Analysis for Computing Escapability and Mutability for Java Components
A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
Aiwu Shi, Gleb Naumovich
CSE
2008
IEEE
14 years 3 months ago
A Trust Model Applied to E-mail Servers
E-mail services are essential in the Internet. However, the basic e-mail architecture presents problems that opens it to several threats. Alternatives have been proposed to solve ...
Leonardo de Oliveira, Carlos Maziero
FCSC
2010
92views more  FCSC 2010»
13 years 7 months ago
TRainbow: a new trusted virtual machine based platform
Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity...
Yuzhong Sun, Haifeng Fang, Ying Song, Lei Du, Kai ...
ICPR
2006
IEEE
14 years 10 months ago
Challenges for Data Mining in Distributed Sensor Networks
Luca Lombardi, Paolo Lombardi, Virginio Cantoni
HPCS
2008
IEEE
14 years 3 months ago
Using OSCAR to Win the Cluster Challenge
Paul Greidanus, Gordon Willem Klok