Sciweavers

1081 search results - page 141 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
CORR
2010
Springer
109views Education» more  CORR 2010»
13 years 9 months ago
Towards the Development of a Simulator for Investigating the Impact of People Management Practices on Retail Performance
Models to understand the impact of management practices on retail performance are often simplistic and assume low levels of noise and linearity. Of course, in real-life, retail op...
Peer-Olaf Siebers, Uwe Aickelin, Helen Celia, Chri...
CASES
2003
ACM
14 years 2 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
CCR
2002
113views more  CCR 2002»
13 years 8 months ago
A secure multicast protocol with copyright protection
We present a simple, efficient, and secure multicast protocol with copyright protection in an open and insecure network environment. There is a wide variety of multimedia applicat...
Hao-Hua Chu, Lintian Qiao, Klara Nahrstedt, Hua Wa...
ICSE
2009
IEEE-ACM
14 years 3 months ago
Multi-dimensional service compositions
The wide diffusion of reliable Internet is pushing two key novelties in the conception of modern software applications: the Software as a Service paradigm and the idea of the Inte...
Luciano Baresi, Elisabetta Di Nitto, Sam Guinea, S...
CCS
2008
ACM
13 years 10 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...