Sciweavers

2056 search results - page 282 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
ESORICS
2009
Springer
14 years 10 months ago
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
ICWL
2004
Springer
14 years 3 months ago
The Agile Teaching/Learning Methodology and Its e-Learning Platform
Abstract. The Agile Teaching/Learning Methodology (ATLM) is a teaching/learning methodology designed for higher-education based on the best practices and ideas from the field of so...
Andy Hon Wai Chun
IUI
2003
ACM
14 years 3 months ago
Scripting embodied agents behaviour with CML: character markup language
Embodied agents present ongoing challenging agenda for research in multi-modal user interfaces and humancomputer-interaction. Such agent metaphors will only be widely applicable t...
Yasmine Arafa, E. H. Mamdani
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
14 years 5 months ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron
SIGCOMM
2010
ACM
13 years 10 months ago
capDL: a language for describing capability-based systems
Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the s...
Ihor Kuz, Gerwin Klein, Corey Lewis, Adam Walker