Sciweavers

1801 search results - page 245 / 361
» Implementation-Oriented Secure Architectures
Sort
View
111
Voted
NOMS
2006
IEEE
15 years 9 months ago
UNIQuE: A User-Centric Framework for Network Identity Management
—Network identity management system, in theory, is conceived as the solution to many identity-related issues burgeoning day-to-day. These issues, which need to be addressed, rang...
Jörn Altmann, Rajarajan Sampath
ESORICS
2004
Springer
15 years 9 months ago
ARCHERR: Runtime Environment Driven Program Safety
Parameters of a program’s runtime environment such as the machine architecture and operating system largely determine whether a vulnerability can be exploited. For example, the m...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...
AGENTS
2001
Springer
15 years 8 months ago
Every agent a web server, every agent community an intranet..
The research community is struggling with the right approach to integrate emerging agent technology with the exploding web page-based Internet. This paper presents the approach us...
Marshall Brinn, Todd M. Carrico, Nathan Combs
116
Voted
SIGMETRICS
2000
ACM
101views Hardware» more  SIGMETRICS 2000»
15 years 8 months ago
Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs
We consider an architecture for a serverless distributed file system that does not assume mutual trust among the client computers. The system provides security, availability, and ...
William J. Bolosky, John R. Douceur, David Ely, Ma...
102
Voted
AGENTS
2000
Springer
15 years 8 months ago
Dataflow plan execution for software agents
Recent research has made it possible to build information agents that retrieve and integrate information from the World Wide Web. Although there now exist solutions for modeling W...
Greg Barish, Dan DiPasquo, Craig A. Knoblock, Stev...