Sciweavers

1268 search results - page 57 / 254
» Verifying distributed systems: the operational approach
Sort
View
BDIM
2008
IEEE
141views Business» more  BDIM 2008»
13 years 12 months ago
IT confidentiality risk assessment for an architecture-based approach
Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic as...
Ayse Morali, Emmanuele Zambon, Sandro Etalle, Paul...
FAST
2008
14 years 8 days ago
TierStore: A Distributed Filesystem for Challenged Networks in Developing Regions
TierStore is a distributed filesystem that simplifies the development and deployment of applications in challenged network environments, such as those in developing regions. For e...
Michael J. Demmer, Bowei Du, Eric A. Brewer
PDPTA
2010
13 years 7 months ago
A Case Study for SOA System Rejuvenation
- Complex business service systems, such as SOA system, are prone to suffer from reliability problem. Various legend applications compatible in SOA system make things worse. Softwa...
Guanhua Tian, Jianfeng Zhan, Chao Ren, Dan Meng
ICFP
2003
ACM
14 years 10 months ago
A static type system for JVM access control
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementat...
Tomoyuki Higuchi, Atsushi Ohori
USENIX
1994
13 years 11 months ago
Key Management in an Encrypting File System
As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes i...
Matt Blaze