Sciweavers

1801 search results - page 185 / 361
» Implementation-Oriented Secure Architectures
Sort
View
143
Voted
CAINE
2008
15 years 5 months ago
A Graphics-User Interface in Support of a Cognitive Inference Architecture
- The objective of this paper is to present a graphical-user-interface (GUI) in support of a decision support system (KASER) for machine understanding. In order to provide informat...
Isai Michel Lombera, Jayeshkumar Patel, Stuart Har...
135
Voted
CLEIEJ
2006
147views more  CLEIEJ 2006»
15 years 3 months ago
JADIMA: Virtual Machine Architecture for building JAVA Applications on Grid Platforms
This paper describes JADIMA (Java Distributed Machine), a collaborative platform to construct high performance distributed JAVA applications. JADIMA is a system that automatically...
Yudith Cardinale, Eduardo Blanco, Jesús De ...
116
Voted
HICSS
2003
IEEE
85views Biometrics» more  HICSS 2003»
15 years 9 months ago
Revisiting the Firewall Abolition Act
Mobility and the New Global Economy are accompanied by requirements for dynamism and flexibility, with respect to e-commerce, inter-organizational activity, and security. The clas...
Philip Robinson, Jochen Haller
124
Voted
IEEESP
2007
98views more  IEEESP 2007»
15 years 3 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
WWW
2010
ACM
15 years 10 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner