Sciweavers

385 search results - page 17 / 77
» Problem Frames and Architectures for Security Problems
Sort
View
ISPEC
2007
Springer
14 years 1 months ago
Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems
Considerable research and experiment results in recent years have shown that the server-proxy-user architecture represents an efficient and scalable new paradigm for multimedia con...
Robert H. Deng, Yanjiang Yang
OOPSLA
2009
Springer
14 years 2 months ago
Language factories
Programming languages are the primary mechanism by which software is created, yet most of us have access to only a few, fixed, programming languages. Any problem we wish to expre...
Tony Clark, Laurence Tratt
CORR
2010
Springer
109views Education» more  CORR 2010»
13 years 7 months ago
Experimenting with Innate Immunity
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...
Jamie Twycross, Uwe Aickelin
CD
2005
Springer
14 years 1 months ago
Deployment of Infrastructure and Services in the Open Grid Services Architecture (OGSA)
Abstract. The ability to deploy Grid infrastructure and services across organizational boundaries (rapidly, reliably, and scalably) is critical for the success of large-scale servi...
Paul Brebner, Wolfgang Emmerich
USS
2008
13 years 9 months ago
Securing Provenance
Provenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate financial reports capture provenance information. Many of ...
Uri Braun, Avraham Shinnar, Margo I. Seltzer