Sciweavers

2178 search results - page 289 / 436
» Toward Systemically Secure IT Architectures
Sort
View
CCGRID
2001
IEEE
13 years 11 months ago
While You're Away: A System for Load-Balancing and Resource Sharing Based on Mobile Agents
While You're Away (WYA) is a distributed system that aggregates the computational power of individual computer systems. WYA introduces the notion of Roaming Computations - Ja...
Niranjan Suri, Paul T. Groth, Jeffrey M. Bradshaw
DIMVA
2010
13 years 9 months ago
Conqueror: Tamper-Proof Code Execution on Legacy Systems
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Co...
Lorenzo Martignoni, Roberto Paleari, Danilo Brusch...
ICCSA
2009
Springer
14 years 2 months ago
ODDUGI: Ubiquitous Mobile Agent System
A mobile agent is regarded as an attractive technology when developing distributed applications in mobile and ubiquitous computing environments. In this paper, we present ODDUGI, a...
SungJin Choi, Hyunseung Choo, MaengSoon Baik, Hong...
ECRA
2007
69views more  ECRA 2007»
13 years 8 months ago
NetPay: An off-line, decentralized micro-payment system for thin-client applications
Micro-payment systems have become popular in recent times as the desire to support low-value, high-volume transactions of text, music, clip-art, video and other media has increase...
Xiaoling Dai, John C. Grundy
TCS
2008
13 years 8 months ago
Role-based access control for boxed ambients
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acad...
Adriana B. Compagnoni, Elsa L. Gunter, Philippe Bi...