Sciweavers

2310 search results - page 332 / 462
» Managing System and Active-Content Integrity
Sort
View
GCC
2006
Springer
13 years 11 months ago
Redar: A Remote Desktop Architecture for the Distributed Virtual Personal Computing
Some popular computing technologies, such as ubiquitous computing, grid computing and thin-client computing, bring people to a much more distributed and pervasive computing enviro...
Yuedong Zhang, Zhenhua Song, Dingju Zhu, Zhuan Che...
CCS
2008
ACM
13 years 10 months ago
Improving the scalability of platform attestation
In the process of platform attestation, a Trusted Platform Module is a performance bottleneck, which causes enormous delays if multiple simultaneously attestation requests arrive ...
Frederic Stumpf, Andreas Fuchs, Stefan Katzenbeiss...
SIGCOMM
2010
ACM
13 years 8 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
ICDE
2009
IEEE
138views Database» more  ICDE 2009»
13 years 5 months ago
Similarity Group-By
The identification and processing of similarities in the data play a key role in multiple application scenarios. Several types of similarity-aware operations have been studied in ...
Yasin N. Silva, Walid G. Aref, Mohamed H. Ali
ICWS
2009
IEEE
13 years 5 months ago
From Workflow Models to Executable Web Service Interfaces
Workflow models have been used and refined for years to execute processes within organisations. To deal with collaborative processes (choreographies) these internal workflow model...
Armin Haller, Mateusz Marmolowski, Walid Gaaloul, ...