Sciweavers

577 search results - page 30 / 116
» Engineering Sufficiently Secure Computing
Sort
View
120
Voted
ATC
2009
Springer
15 years 5 months ago
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...
CCGRID
2005
IEEE
15 years 8 months ago
Experiences in teaching grid computing to advanced level students
The development of teaching materials for future software engineers is critical to the long term success of the Grid. At present however there is considerable turmoil in the Grid ...
Richard O. Sinnott, A. J. Stell, J. P. Watt
119
Voted
SP
1999
IEEE
132views Security Privacy» more  SP 1999»
15 years 6 months ago
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST)
This paper describes an expert system development toolset called the Production-Based Expert System Toolset (P-BEST) and how it is employed in the development of a modern generic ...
Ulf Lindqvist, Phillip A. Porras
ICDCSW
2005
IEEE
15 years 8 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
112
Voted
DISCEX
2003
IEEE
15 years 7 months ago
MYSEA Technology Demonstration
The MYSEA project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mechanis...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...