Sciweavers

897 search results - page 26 / 180
» Security Requirements for RFID Computing Systems
Sort
View
ATAL
2009
Springer
14 years 2 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
ECBS
2006
IEEE
126views Hardware» more  ECBS 2006»
14 years 2 months ago
Experiments and Investigations for the Personal High Performance Computing (PHPC) built on top of the 64-bit processing and clus
The motivation and objective for this paper is to demonstrate “Personal High Performance Computing (PHPC)”, which requires only a smaller number of computers, resources and sp...
Victor Chang
ADC
2009
Springer
122views Database» more  ADC 2009»
14 years 2 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
ACSAC
2010
IEEE
13 years 6 months ago
Always up-to-date: scalable offline patching of VM images in a compute cloud
Patching is a critical security service that keeps computer systems up to date and defends against security threats. Existing patching systems all require running systems. With th...
Wu Zhou, Peng Ning, Xiaolan Zhang, Glenn Ammons, R...
JSSPP
2005
Springer
14 years 1 months ago
Enhancing Security of Real-Time Applications on Grids Through Dynamic Scheduling
Real-time applications with security requirements are emerging in various areas including government, education, and business. The security sensitive real-time applications can ta...
Tao Xie 0004, Xiao Qin