Sciweavers

1352 search results - page 95 / 271
» Designing Security Requirements Models Through Planning
Sort
View
CASCON
1996
126views Education» more  CASCON 1996»
13 years 10 months ago
Evaluating the costs of management: a distributed applications management testbed
In today's distributed computing environments, users are makingincreasing demands on the systems, networks, and applications they use. Users are coming to expect performance,...
Michael Katchabaw, Stephen L. Howard, Andrew D. Ma...
FC
2010
Springer
226views Cryptology» more  FC 2010»
14 years 8 days ago
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model
Abstract. Secure login methods based on human cognitive skills can be classified into two categories based on information available to a passive attacker: (i) the attacker fully ob...
Toni Perkovic, Mario Cagalj, Nitesh Saxena
SOSP
2009
ACM
14 years 5 months ago
Distributed aggregation for data-parallel computing: interfaces and implementations
Data-intensive applications are increasingly designed to execute on large computing clusters. Grouped aggregation is a core primitive of many distributed programming models, and i...
Yuan Yu, Pradeep Kumar Gunda, Michael Isard
P2P
2010
IEEE
136views Communications» more  P2P 2010»
13 years 6 months ago
On the Privacy of Peer-Assisted Distribution of Security Patches
Abstract--When a host discovers that it has a software vulnerability that is susceptible to an attack, the host needs to obtain and install a patch. Because centralized distributio...
Di Wu, Cong Tang, Prithula Dhungel, Nitesh Saxena,...
CIS
2007
Springer
13 years 10 months ago
Security Assurance for Dynamic Role Mapping in a Multi-Domain Environment
Multi-domain application environments where distributed domains interoperate with each other are becoming a reality in Internet-based enterprise applications. The secure interoper...
Cuihua Zuo, Ruixuan Li, Hongmu Han, Zhengding Lu