Sciweavers

472 search results - page 16 / 95
» What Networking of Information Can Do for Cloud Computing
Sort
View
ESOP
2005
Springer
14 years 1 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
WWW
2009
ACM
14 years 8 months ago
A measurement-driven analysis of information propagation in the flickr social network
Online social networking sites like MySpace, Facebook, and Flickr have become a popular way to share and disseminate content. Their massive popularity has led to viral marketing t...
Meeyoung Cha, Alan Mislove, P. Krishna Gummadi
SIGUCCS
2004
ACM
14 years 1 months ago
A platform independent tool for evaluating performance of computing equipment for a computer laboratory
Designing computing equipment for a computer laboratory is not easy. In a class in a computer laboratory, it is not unusual that all students do the same thing simultaneously. Tre...
Takashi Yamanoue
JCP
2007
121views more  JCP 2007»
13 years 7 months ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray
SP
2009
IEEE
128views Security Privacy» more  SP 2009»
14 years 2 months ago
Quantifying Information Leaks in Outbound Web Traffic
As the Internet grows and network bandwidth continues to increase, administrators are faced with the task of keeping confidential information from leaving their networks. Today’...
Kevin Borders, Atul Prakash