Sciweavers

1988 search results - page 229 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
IFM
2010
Springer
190views Formal Methods» more  IFM 2010»
15 years 28 days ago
On Model Checking Techniques for Randomized Distributed Systems
Abstract. The automata-based model checking approach for randomized distributed systems relies on an operational interleaving semantics of the system by means of a Markov decision ...
Christel Baier
125
Voted
AMW
2010
15 years 3 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
DOA
2000
159views more  DOA 2000»
15 years 3 months ago
Mobile Code as an Enabling Technology for Service-Oriented Smartcard Middleware
Smartcards can be seen as service providing entities that implement a secure, tamper-proof storage and offer computational resources which make them ideally suited for a variety o...
Roger Kehr, Michael Rohs, Harald Vogt
ACMDIS
2010
ACM
15 years 2 months ago
Watt-Lite: energy statistics made tangible
Increasing our knowledge of how design affects behaviour in the workplace has a large potential for reducing electricity consumption. This would be beneficial for the environment ...
Li Jönsson, Loove Broms, Cecilia Katzeff
SACMAT
2010
ACM
15 years 24 days ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino