Sciweavers

200 search results - page 27 / 40
» Replicating and Sharing Computer Security Laboratory Environ...
Sort
View
SIGOPSE
1998
ACM
14 years 6 days ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau
SPC
2005
Springer
14 years 1 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
IRI
2005
IEEE
14 years 1 months ago
Data-knowledge-context: an application model for collaborative work
For many years, researchers and software developers have been seeking to develop systems and applications to enable efficient and effective group work and organizational memory. ...
Lee A. Iverson
IMC
2004
ACM
14 years 1 months ago
A framework for malicious workload generation
Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
Joel Sommers, Vinod Yegneswaran, Paul Barford
IPPS
2006
IEEE
14 years 2 months ago
Checkpointing and rollback-recovery protocol for mobile systems with MW session guarantee
In the mobile environment, weak consistency replication of shared data is the key to obtaining high data availability, good access performance, and good scalability. Therefore new...
Jerzy Brzezinski, Anna Kobusinska, Michal Szychowi...