Sciweavers

1988 search results - page 286 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
CCGRID
2005
IEEE
14 years 2 months ago
A grid application development platform for WebCom-G
Grid Computing is becoming more popular. The traditional role of the Internet as being an information repository is evolving to become a resource repository. People using the Inte...
John P. Morrison, Sunil John, David A. Power, Neil...
FOCS
2008
IEEE
14 years 3 months ago
Leakage-Resilient Cryptography
We construct a stream-cipher SC whose implementation is secure even if a bounded amount of arbitrary (adaptively, adversarially chosen) information about the internal state of SC ...
Stefan Dziembowski, Krzysztof Pietrzak
SACMAT
2006
ACM
14 years 3 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
SIGECOM
2004
ACM
104views ECommerce» more  SIGECOM 2004»
14 years 2 months ago
An economic answer to unsolicited communication
We explore an alternative approach to spam based on economic rather than technological or regulatory screening mechanisms. We employ a model of email value which supports two intu...
Thede Loder, Marshall W. van Alstyne, Rick Wash
GROUP
2009
ACM
14 years 3 months ago
Emergent team coordination: from fire emergency response practice to a non-mimetic simulation game
We take the work practices of fire emergency responders as the basis for developing simulations to teach team coordination. We introduce non-mimetic simulation: economic operation...
Zachary O. Toups, Andruid Kerne, William A. Hamilt...