Sciweavers

1177 search results - page 202 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
ECTEL
2006
Springer
14 years 12 days ago
Peer-to-peer Face-to-face Collaboration
In this paper, we present a proof of concept application of a technique that is designed explicitly for face to face collaboration software architectures. The objective is to minim...
Delfina Malandrino, Ilaria Manno
FC
1997
Springer
86views Cryptology» more  FC 1997»
14 years 27 days ago
The SPEED Cipher
Abstract. SPEED is a private key block cipher. It supports three variable parameters: (1) data length — the length of a plaintext/ciphertext of SPEED can be 64, 128 or 256 bits. ...
Yuliang Zheng
EUROSYS
2007
ACM
14 years 5 months ago
Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors
Hypervisors, popularized by Xen and VMware, are quickly becoming commodity. They are appropriate for many usage scenarios, but there are scenarios that require system virtualizatio...
Stephen Soltesz, Herbert Pötzl, Marc E. Fiucz...
ICSE
1999
IEEE-ACM
14 years 1 months ago
Information Survivability Control Systems
We address the dependence of critical infrastructures— including electric power, telecommunications, finance and transportation—on vulnerable information systems. Our approach...
Kevin J. Sullivan, John C. Knight, Xing Du, Steve ...
ARCS
2006
Springer
14 years 14 days ago
Fault-Tolerant Time-Triggered Ethernet Configuration with Star Topology
: We have shown in our past work that the standard configuration of Time-Triggered (TT) Ethernet unifies real-time and non-real-time traffic within a single coherent communication ...
Astrit Ademaj, Hermann Kopetz, Petr Grillinger, Kl...