Sciweavers

320 search results - page 20 / 64
» Security architecture for component-based operating systems
Sort
View
FAST
2003
13 years 10 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ļ¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
CMS
2003
171views Communications» more  CMS 2003»
13 years 10 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
SAFECOMP
2007
Springer
14 years 2 months ago
Controller Architecture for Safe Cognitive Technical Systems
Abstract. Cognition of technical systems, as the ability to perceive situations, to learn about favorable behavior, and to autonomously generate decisions, adds new attributes to s...
Sebastian Kain, Hao Ding, Frank Schiller, Olaf Stu...
CORR
2002
Springer
188views Education» more  CORR 2002»
13 years 8 months ago
GridBank: A Grid Accounting Services Architecture (GASA) for Distributed Systems Sharing and Integration
Computational Grids are emerging as a new infrastructure for Internet-based parallel and distributed computing. They enable the sharing, exchange, discovery, and aggregation of re...
Alexander Barmouta, Rajkumar Buyya
SP
2003
IEEE
121views Security Privacy» more  SP 2003»
14 years 1 months ago
Specifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an ā€œidealizedā€ hich gives the abstracted actions available to a single user program. ...
David Lie, John C. Mitchell, Chandramohan A. Thekk...