Sciweavers

5891 search results - page 150 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
IJNSEC
2007
139views more  IJNSEC 2007»
15 years 4 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
CLUSTER
2000
IEEE
15 years 8 months ago
Agilent's Key Technologies in Remote System Management
Agilent Technologies Boeblingen Verification Solutions is offering a variety of remote system management products. This paper will summarize the key technologies on which Agilents...
Michael Herz
ERLANG
2006
ACM
15 years 10 months ago
Concurrency oriented programming in termite scheme
Termite Scheme is a variant of Scheme intended for distributed computing. It offers a simple and powerful concurrency model, inspired by the Erlang programming language, which is ...
Guillaume Germain
TROB
2002
120views more  TROB 2002»
15 years 4 months ago
DPAC: an object-oriented distributed and parallel computing framework for manufacturing applications
Parallel and distributed computing infrastructure are increasingly being embraced in the context of manufacturing applications, including real-time scheduling. In this paper, we pr...
N. R. Srinivasa Raghavan, Tanmay Waghmare
CCS
2004
ACM
15 years 9 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii