Sciweavers

3605 search results - page 170 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
SACMAT
2003
ACM
14 years 1 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
OSDI
2002
ACM
14 years 8 months ago
Secure Routing for Structured Peer-to-Peer Overlay Networks
Structured peer-to-peer overlay networks provide a substrate for the construction of large-scale, decentralized applications, including distributed storage, group communication, a...
Miguel Castro, Peter Druschel, Ayalvadi J. Ganesh,...
OSDI
2004
ACM
14 years 8 months ago
Enhancing Server Availability and Security Through Failure-Oblivious Computing
We present a new technique, failure-oblivious computing, that enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks th...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
AGENTS
2001
Springer
14 years 21 days ago
Using rat navigation models to learn orientation from visual input on a mobile robot
Rodents possess extraordinary navigation abilities that are far in excess of what current state-of-the-art robot agents are capable of. This paper describes research that is part ...
Brett Browning
ISSADS
2005
Springer
14 years 1 months ago
Security Challenges of Distributed e-Learning Systems
Roberto Gómez Cárdenas, Erika Mata S...