Sciweavers

1770 search results - page 3 / 354
» Writing requirements in computer security
Sort
View
CCS
1994
ACM
13 years 11 months ago
Support for the File System Security Requirements of Computational E-Mail Systems
Computational e-mail systems, which allow mail messages to containcommandscripts that automaticallyexecute upon receipt, can be used as a basis for building a variety of collabora...
Trent Jaeger, Atul Prakash
HPCA
1997
IEEE
13 years 11 months ago
Design Issues and Tradeoffs for Write Buffers
Processors with write-through caches typically require a write buffer to hide the write latency to the next level of memory hierarchy and to reduce write traffic. A write buffer ...
Kevin Skadron, Douglas W. Clark
PCI
2009
Springer
14 years 3 days ago
A Foundation for Defining Security Requirements in Grid Computing
—Despite the wide adoption by the scientific community, grid technologies have not been given the appropriate attention by enterprises. This is merely due to the lack of enough s...
Antonios Gouglidis, Ioannis Mavridis
ICALP
2007
Springer
14 years 1 months ago
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories
Motivated by the challenging task of designing “secure” vote storage mechanisms, we study information storage mechanisms that operate in extremely hostile environments. In suc...
Tal Moran, Moni Naor, Gil Segev
NORDICHI
2004
ACM
14 years 1 months ago
Sharing and learning through pair writing of scenarios
This paper describes the results of an empirical study consisting of five sessions where scenarios are written by two writers working in unison, for instance a usability specialis...
Adi B. Tedjasaputra, Eunice Ratna Sari, Georg Stro...