Sciweavers

384 search results - page 14 / 77
» Trust as dependence: a logical approach
Sort
View
HOTDEP
2008
122views Hardware» more  HOTDEP 2008»
13 years 10 months ago
Dependable Self-Hosting Distributed Systems Using Constraints
We describe a technique for writing distributed applications which manage themselves over one or more utility computing infrastructures: by dynamically acquiring new computational...
Qin Yin, Justin Cappos, Andrew Baumann, Timothy Ro...
ICN
2005
Springer
14 years 1 months ago
Scalable Group Key Management with Partially Trusted Controllers
Abstract. Scalable group key management solutions are crucial for supporting Internet applications that are based on a group communication model. Many solutions have been proposed ...
Himanshu Khurana, Rafael Bonilla, Adam J. Slagell,...
ICWS
2007
IEEE
13 years 9 months ago
Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions
Security enforcement framework is an important aspect of any distributed system. With new requirements imposed by SOA-based business models, adaptive security enforcement on the a...
Ivan Djordjevic, Srijith K. Nair, Theodosis Dimitr...
DATE
2007
IEEE
80views Hardware» more  DATE 2007»
14 years 2 months ago
Engineering trust with semantic guardians
The ability to guarantee the functional correctness of digital integrated circuits and, in particular, complex microprocessors, is a key task in the production of secure and trust...
Ilya Wagner, Valeria Bertacco
CGF
2008
137views more  CGF 2008»
13 years 8 months ago
Interaction-Dependent Semantics for Illustrative Volume Rendering
In traditional illustration the choice of appropriate styles and rendering techniques is guided by the intention of the artist. For illustrative volume visualizations it is diffic...
Peter Rautek, Stefan Bruckner, M. Eduard Gröl...