Sciweavers

2335 search results - page 49 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
ASAP
2010
IEEE
148views Hardware» more  ASAP 2010»
15 years 4 months ago
Function flattening for lease-based, information-leak-free systems
Recent research has proposed security-critical real-time embedded systems with provably-strong information containment through the use of hardware-enforced execution leases. Execut...
Xun Li, Mohit Tiwari, Timothy Sherwood, Frederic T...
99
Voted
FTDCS
1997
IEEE
15 years 6 months ago
Intrusion ripple analysis in distributed information systems
: Security is a very important aspect of distributed computing systems, especially in distributed information environments involving widearea networks, such as internets. In this p...
S. S. Yau, Jun Zhu
106
Voted
ISPDC
2006
IEEE
15 years 8 months ago
Managing Information and Time Flow in an Agent-Based E-Commerce System
Recently, we have proposed a comprehensive agent-based e-commerce system. While UML formalized, it lacked details how basic functions – e.g. user request to purchase a given pro...
Maciej Gawinecki, Maria Ganzha, Pawel Kobzdej, Mar...
101
Voted
COMPSAC
2002
IEEE
15 years 7 months ago
Designing a Distributed Software Development Support System Using a Peer-to-Peer Architecture
Distributed software development support systems typically use a centralized client-server architecture. This approach has some drawbacks such as the participants may experience l...
Seth Bowen, Frank Maurer
132
Voted
EUROSYS
2008
ACM
15 years 11 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...