Sciweavers

1801 search results - page 253 / 361
» Implementation-Oriented Secure Architectures
Sort
View
DAC
2008
ACM
16 years 4 months ago
Bounded-lifetime integrated circuits
Integrated circuits with bounded lifetimes can have many business advantages. We give some simple examples of m ods to enforce tunable expiration dates for chips using nanom reliab...
Puneet Gupta, Andrew B. Kahng
106
Voted
PIMRC
2008
IEEE
15 years 10 months ago
A hybrid P2P/Infrastructure platform for personal and social Internet services
—While pure web-based services and P2P technologies are popular for personal and social networking, they both have inherent limitations. A hybrid P2P/Infrastrucutre approach coul...
Dimitris N. Kalofonos, Zoe Antoniou
121
Voted
RTAS
2008
IEEE
15 years 10 months ago
Access Control for Adaptive Reservations on Multi-User Systems
This paper tackles the problem of defining an appropriate access control model for multi-user systems providing adaptive resource reservations to unprivileged users. Security req...
Tommaso Cucinotta
110
Voted
IPPS
2007
IEEE
15 years 10 months ago
A WSRF-Compliant Debugger for Grid Applications
Grid computing allows the utilization of vast computational resources for solving complex scientific and engineering problems. However, development tools for Grid applications are...
Donny Kurniawan, David Abramson
130
Voted
ADAEUROPE
2007
Springer
15 years 10 months ago
Enhancing Dependability of Component-Based Systems
Abstract. We present an approach for enhancing dependability of component-based software. Functionality related to security, safety and reliability is encapsulated in specific com...
Arnaud Lanoix, Denis Hatebur, Maritta Heisel, Jean...