Sciweavers

2517 search results - page 42 / 504
» Secure Deployment of Components
Sort
View
COMPUTER
1998
75views more  COMPUTER 1998»
15 years 2 months ago
Security Control for COTS Components
Qun Zhong, Nigel Edwards
131
Voted
IEEECIT
2010
IEEE
15 years 1 months ago
Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection
—This paper presents VSK, a lightweight adaptable OS authorization architecture suitable for self-protection of pervasive devices. A “virtual” management plane, separate from...
Ruan He, Marc Lacoste, Jean Leneutre
JCP
2006
85views more  JCP 2006»
15 years 2 months ago
How To Generate Distributed Software Components From Centralized Ones?
Adapting software components to be used in a particular application is a crucial issue in software component based technology. In fact, software components can be used in contexts ...
Abdelhak Seriai, Gautier Bastide, Mourad Oussalah
WWW
2010
ACM
15 years 9 months ago
The social honeypot project: protecting online communities from spammers
We present the conceptual framework of the Social Honeypot Project for uncovering social spammers who target online communities and initial empirical results from Twitter and MySp...
Kyumin Lee, James Caverlee, Steve Webb
123
Voted
GRID
2004
Springer
15 years 8 months ago
Distributed Ant: A System to Support Application Deployment in the Grid
e-Science has much to benefit from the emerging field of grid computing. However, construction of e-Science grids is a complex and inefficient undertaking. In particular, deployme...
Wojtek Goscinski, David Abramson