Sciweavers

1081 search results - page 102 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
DBSEC
2000
110views Database» more  DBSEC 2000»
13 years 10 months ago
Role-Based Security in a Distributed Resource Environment
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, Enterprise Java Beans, Java IDL, JDBC, etc. Most promising, is the emergence of ...
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. ...
GECCO
2008
Springer
179views Optimization» more  GECCO 2008»
13 years 10 months ago
Emergent architecture in self organized swarm systems for military applications
Many sectors of the military are interested in Self-Organized (SO) systems because of their flexibility, versatility and economics. The military is researching and employing auto...
Dustin J. Nowak, Gary B. Lamont, Gilbert L. Peters...
SASO
2008
IEEE
14 years 3 months ago
A Middleware Architecture for Human-Centred Pervasive Adaptive Applications
As software is more and more interweaving with our everyday life, designing software in a way that it reflects and respects the user and her emotional physical conditions, cogniti...
Andreas Schroeder, Marjolein van der Zwaag, Moritz...
CCS
2009
ACM
14 years 9 months ago
A conceptual framework for Group-Centric secure information sharing
In this paper, we propose a conceptual framework for developing a family of models for Group-Centric information sharing. The traditional approach to information sharing, characte...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
SAC
2009
ACM
14 years 3 months ago
On the practical importance of communication complexity for secure multi-party computation protocols
Many advancements in the area of Secure Multi-Party Computation (SMC) protocols use improvements in communication complexity as a justification. We conducted an experimental stud...
Florian Kerschbaum, Daniel Dahlmeier, Axel Schr&ou...