Sciweavers

316 search results - page 22 / 64
» Where do security policies come from
Sort
View
CN
2007
110views more  CN 2007»
13 years 7 months ago
Stability of FIFO networks under adversarial models: State of the art
Network stability is an important issue that has attracted the attention of many researchers in recent years. Such interest comes from the need to ensure that, as the system runs ...
Vicent Cholvi, Juan Echagüe
COR
2006
79views more  COR 2006»
13 years 7 months ago
Sweep synchronization as a global propagation mechanism
This paper presents a new generic filtering algorithm which simultaneously considers n conjunctions of constraints as well as those constraints mentioning some variables Yk of the...
Nicolas Beldiceanu, Mats Carlsson, Sven Thiel
PERVASIVE
2006
Springer
13 years 7 months ago
Secure Mobile Computing Via Public Terminals
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
Richard Sharp, James Scott, Alastair R. Beresford
SIGOPS
2008
152views more  SIGOPS 2008»
13 years 7 months ago
The Caernarvon secure embedded operating system
The Caernarvon operating system was developed to demonstrate that a high assurance system for smart cards was technically feasible and commercially viable. The entire system has b...
David C. Toll, Paul A. Karger, Elaine R. Palmer, S...
IPPS
2007
IEEE
14 years 1 months ago
Securing Grid Data Transfer Services with Active Network Portals
Widely available and utilized Grid servers are vulnerable to a variety of threats from Denial of Service (DoS) attacks, overloading caused by flash crowds, and compromised client ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...