Sciweavers

185 search results - page 11 / 37
» File and Memory Security Analysis for Grid Systems
Sort
View
IEEEARES
2008
IEEE
14 years 1 months ago
Type and Effect Annotations for Safe Memory Access in C
In this paper, we present a novel type and effect analysis for detecting memory errors in C source code. We extend the standard C type system with effect, region, and host annotat...
Syrine Tlili, Mourad Debbabi
CCS
2007
ACM
14 years 1 months ago
Pors: proofs of retrievability for large files
In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier...
Ari Juels, Burton S. Kaliski Jr.
KDD
2006
ACM
143views Data Mining» more  KDD 2006»
14 years 7 months ago
Mining for misconfigured machines in grid systems
Grid systems are proving increasingly useful for managing the batch computing jobs of organizations. One well known example for that is Intel which uses an internally developed sy...
Noam Palatin, Arie Leizarowitz, Assaf Schuster, Ra...
IPPS
2006
IEEE
14 years 1 months ago
Trust overlay networks for global reputation aggregation in P2P grid computing
1 This paper presents a new approach to trusted Grid computing in a Peer-to-Peer (P2P) setting. Trust and security are essential to establish lasting working relationships among th...
Runfang Zhou, Kai Hwang
BMCBI
2006
116views more  BMCBI 2006»
13 years 7 months ago
JColorGrid: software for the visualization of biological measurements
Background: Two-dimensional data colourings are an effective medium by which to represent three-dimensional data in two dimensions. Such "color-grid" representations hav...
Marcin P. Joachimiak, Jennifer L. Weissman, Barnab...