Sciweavers

2927 search results - page 154 / 586
» Secure Distributed Human Computation
Sort
View
HUMAN
2003
Springer
14 years 2 months ago
DOC: A Distributed Object Caching System for Information Infrastructure
Object caching is a desirable feature to improve the both scalability and performance of distributed application systems for information infrastructure, the information management ...
Taehee Lee, Junho Shim, Sang-goo Lee
SC
2009
ACM
14 years 2 months ago
Enhancing the earth system grid security infrastructure through single sign-on and autoprovisioning
In this paper, we discuss the recent ESG’s development and implementation efforts concerning its authentication infrastructure. ESG’s requirements are to make the user’s log...
Frank Siebenlist, Rachana Ananthakrishnan, David E...
NSPW
2006
ACM
14 years 3 months ago
Dark application communities
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...
ISSA
2008
13 years 11 months ago
A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code
Malicious software is prevalent in many forms with the potential for many types of malware to be downloaded while browsing the Internet using an unprotected system. The potential ...
Leonard Shand, Theodore Tryfonas
FSTTCS
2009
Springer
14 years 4 months ago
Non-Local Box Complexity and Secure Function Evaluation
ABSTRACT. A non-local box is an abstract device into which Alice and Bob input bits x and y respectively and receive outputs a and b respectively, where a, b are uniformly distribu...
Marc Kaplan, Iordanis Kerenidis, Sophie Laplante, ...