Sciweavers

1139 search results - page 215 / 228
» Trust Management Survey
Sort
View
SIGMOD
2009
ACM
132views Database» more  SIGMOD 2009»
14 years 8 months ago
Taming the storage dragon: the adventures of hoTMaN
HoTMaN (HoT-standby MaNager) is a joint research and development project between MySpace and USC Database Laboratory to design and develop a tool to ensure a 24x7 up-time and ease...
Shahram Ghandeharizadeh, Andrew Goodney, Chetan Sh...
PLDI
2010
ACM
14 years 5 months ago
Type-preserving Compilation for End-to-end Verification of Security Enforcement
A number of programming languages use rich type systems to verify security properties of code. Some of these languages are meant for source programming, but programs written in th...
Juan Chen, Ravi Chugh, Nikhil Swamy
EUROSYS
2008
ACM
14 years 5 months ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...
WASA
2009
Springer
141views Algorithms» more  WASA 2009»
14 years 2 months ago
Design and Implementation of Davis Social Links OSN Kernel
Social network popularity continues to rise as they broaden out to more users. Hidden away within these social networks is a valuable set of data that outlines everyone’s relatio...
Thomas Tran, Kelcey Chan, Shaozhi Ye, Prantik Bhat...
FC
2009
Springer
104views Cryptology» more  FC 2009»
14 years 2 months ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp