Sciweavers

1274 search results - page 196 / 255
» New Proofs for
Sort
View
MATA
2004
Springer
149views Communications» more  MATA 2004»
14 years 3 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
CSFW
2003
IEEE
14 years 3 months ago
Probabilistic Noninterference through Weak Probabilistic Bisimulation
To be practical, systems for ensuring secure information flow must be as permissive as possible. To this end, the author recently proposed a type system for multi-threaded progra...
Geoffrey Smith
DSN
2003
IEEE
14 years 3 months ago
Compiler-Directed Program-Fault Coverage for Highly Available Java Internet Services
Abstract: We present a new approach that uses compilerdirected fault-injection for coverage testing of recovery code in Internet services to evaluate their robustness to operating ...
Chen Fu, Richard P. Martin, Kiran Nagaraja, Thu D....
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
14 years 3 months ago
Message Sense Maker: Engineering a Tool Set for Customer Relationship Management
To determine the important trends and issues in thousands of comments from customers and make strategic decisions about business operations, managers must go over these messages m...
Dmitri Roussinov, J. Leon Zhao
SRDS
2003
IEEE
14 years 3 months ago
Assessing the Dependability of OGSA Middleware by Fault Injection
This paper presents our research on devising a dependability assessment method for the upcoming OGSA 3.0 middleware using network level fault injection. We compare existing DCE mi...
Nik Looker, Jie Xu