Sciweavers

2024 search results - page 60 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
132
Voted
CSFW
2008
IEEE
15 years 11 months ago
Evidence-Based Audit
Authorization logics provide a principled and flexible approach to specifying access control policies. One of their compelling benefits is that a proof in the logic is evidence ...
Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, Steve...
174
Voted
AINA
2010
IEEE
15 years 9 months ago
CloudAnalyst: A CloudSim-Based Visual Modeller for Analysing Cloud Computing Environments and Applications
—Advances in Cloud computing enable new possibilities to Internet applications developers. Previously, the main concern of Internet applications developers was deployment and hos...
Bhathiya Wickremasinghe, Rodrigo N. Calheiros, Raj...
IPPS
1999
IEEE
15 years 9 months ago
Developing Parallel Applications Using the JAVAPORTS Environment
The JavaPorts system is an environment that facilitates the rapid development of modular, reusable, Java-based parallel and distributed applications for networked machines with het...
Demetris G. Galatopoullos, Elias S. Manolakos
USENIX
1994
15 years 6 months ago
SNP: An Interface for Secure Network Programming
SNP provides a high-level abstraction for secure end-toend network communications. It supports both stream and datagram semantics with security guarantees (e.g., data originauthen...
Thomas Y. C. Woo, Raghuram Bindignavle, Shaowen Su...
AINA
2007
IEEE
15 years 11 months ago
Enforcing Fine-Grained Authorization Policies for Java Mobile Agents
The Mobile Agent (MA) paradigm advocates the migration of agent code to achieve computational goals. MAs require an executable environment on hosts where mobile code can be execut...
Giovanni Russello, Changyu Dong, Naranker Dulay