Sciweavers

979 search results - page 72 / 196
» Developing Dynamic Security Policies
Sort
View
128
Voted
FGCS
2007
90views more  FGCS 2007»
15 years 2 months ago
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
Grid computing is a newly developed technology for complex systems with large-scale resource sharing and multi-institutional collaboration. The prominent feature of grid computing...
Xukai Zou, Yuan-Shun Dai, Xiang Ran
128
Voted
GRID
2006
Springer
15 years 2 months ago
Flexible and Secure Logging of Grid Data Access
-- In Grid collaborations, scientists use middleware to execute computational experiments, visualize results, and securely share data on resources ranging from desktop machines to ...
Weide Zhang, David Del Vecchio, Glenn S. Wasson, M...
131
Voted
IJNSEC
2007
142views more  IJNSEC 2007»
15 years 2 months ago
Java Bytecode Dependence Analysis for Secure Information Flow
Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Inform...
Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Ma...
120
Voted
ESSOS
2010
Springer
15 years 11 months ago
Automatic Generation of Smart, Security-Aware GUI Models
In many software applications, users access application data using graphical user interfaces (GUIs). There is an important, but little explored, link between visualization and secu...
David A. Basin, Manuel Clavel, Marina Egea, Michae...
113
Voted
SIGOPS
2008
152views more  SIGOPS 2008»
15 years 2 months ago
The Caernarvon secure embedded operating system
The Caernarvon operating system was developed to demonstrate that a high assurance system for smart cards was technically feasible and commercially viable. The entire system has b...
David C. Toll, Paul A. Karger, Elaine R. Palmer, S...