Sciweavers

374 search results - page 11 / 75
» Deployment automation with BLITZ
Sort
View
COMPSAC
2009
IEEE
14 years 3 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
CCGRID
2010
IEEE
13 years 9 months ago
An Effective Architecture for Automated Appliance Management System Applying Ontology-Based Cloud Discovery
Cloud computing is a computing paradigm which allows access of computing elements and storages on-demand over the Internet. Virtual Appliances, pre-configured, readyto-run applicat...
Amir Vahid Dastjerdi, Sayed Gholam Hassan Tabataba...
IAAI
2003
13 years 10 months ago
CriterionSM Online Essay Evaluation: An Application for Automated Evaluation of Student Essays
This paper describes a deployed educational technology application: the CriterionSM Online Essay Evaluation Service, a web-based system that provides automated scoring and evaluat...
Jill Burstein, Martin Chodorow, Claudia Leacock
NDSS
2000
IEEE
14 years 1 months ago
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection...
David Wagner, Jeffrey S. Foster, Eric A. Brewer, A...
IAAI
2001
13 years 10 months ago
TALPS: The T-AVB Automated Load Planning System
Due to military drawdowns and the need for additional transportation lift requirements, the US MARINE CORPS developed a concept wherein they had modified a commercial container sh...
Paul S. Cerkez