Sciweavers

1373 search results - page 73 / 275
» Secure multi-mode systems and their applications for pervasi...
Sort
View
SOFSEM
1998
Springer
14 years 27 days ago
Distributed Systems Technology for Electronic Commerce Applications
Abstract. Based on the specific characteristics of electronic commerce (ECommerce) requirements for an adequate system support, this contribution gives an overview of the respectiv...
Winfried Lamersdorf, Michael Merz, M. Tuan Tu
SP
2002
IEEE
226views Security Privacy» more  SP 2002»
13 years 8 months ago
Dynamic load balancing of SAMR applications on distributed systems
Dynamic load balancing(DLB) for parallel systems has been studied extensively; however, DLB for distributed systems is relatively new. To efficiently utilize computing resources p...
Zhiling Lan, Valerie E. Taylor, Greg Bryan
SACMAT
2010
ACM
13 years 7 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
SP
2002
IEEE
121views Security Privacy» more  SP 2002»
13 years 8 months ago
Intrusion-Tolerant Enclaves
Despite our best efforts, any sufficiently complex computer system has vulnerabilities. It is safe to assume that such vulnerabilities can be exploited by attackers who will be ab...
Bruno Dutertre, Valentin Crettaz, Victoria Stavrid...
FOSAD
2009
Springer
14 years 3 months ago
Logic in Access Control (Tutorial Notes)
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and t...
Martín Abadi