Sciweavers

2057 search results - page 69 / 412
» Distributed Secure Systems: Then and Now
Sort
View
SAC
2004
ACM
15 years 9 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
151
Voted
COMCOM
1998
132views more  COMCOM 1998»
15 years 3 months ago
A distributed object platform infrastructure for multimedia applications
Although distributed object computing has developed rapidly over the past decade, and is now becoming commercially important, there remain key application areas inadequately suppo...
Geoff Coulson, Michael Clarke
134
Voted
CSFW
2008
IEEE
15 years 10 months ago
DKAL: Distributed-Knowledge Authorization Language
DKAL is a new declarative authorization language for distributed systems. It is based on existential fixed-point logic and is considerably more expressive than existing authoriza...
Yuri Gurevich, Itay Neeman
MASCOTS
1998
15 years 5 months ago
Pro-active Performance Management of Distributed Applications
Self-managing systems able to dynamically re-configure with respect to time-varying workload mixes and changing system resource availability are of growing importance in heterogen...
Alois Ferscha, James Johnson, Gabriele Kotsis, Cos...
SOSP
1993
ACM
15 years 5 months ago
Handling Audio and Video Streams in a Distributed Environment
Handling audio and video in a digital environment requires timely delivery of data. This paper describes the principles adopted in the design of the Pandora networked multi-media ...
Alan Jones, Andrew Hopper