Sciweavers

811 search results - page 110 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
ICALP
2007
Springer
14 years 2 months ago
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories
Motivated by the challenging task of designing “secure” vote storage mechanisms, we study information storage mechanisms that operate in extremely hostile environments. In suc...
Tal Moran, Moni Naor, Gil Segev
TRUSTBUS
2007
Springer
14 years 2 months ago
The Meaning of Logs
While logging events is becoming increasingly common in computing, in communication and in collaborative environments, log systems need to satisfy increasingly challenging (if not ...
Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin
SACMAT
2010
ACM
14 years 1 months ago
Role updating for assignments
The role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are usually unde...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
ICAT
2003
IEEE
14 years 2 months ago
Real-time Method for Animating Elastic Objects' Behaviors Including Collisions
We present a new real-time method that can animate a moving elastic object that could collide with other objects in a virtual environment. For simulating physical motions of elast...
Takafumi Watanabe, Jun Ohya, Jun Kurumisawa, Yukio...
ISI
2008
Springer
13 years 8 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....