Sciweavers

1770 search results - page 41 / 354
» Writing requirements in computer security
Sort
View
113
Voted
HPDC
1993
IEEE
15 years 7 months ago
Programming a Distributed System Using Shared Objects
Building the hardware for a high-performance distributed computer system is a lot easier than building its software. In this paper we describe a model for programtributed systems ...
Andrew S. Tanenbaum, Henri E. Bal, M. Frans Kaasho...
SP
2008
IEEE
15 years 10 months ago
Preventing Memory Error Exploits with WIT
Attacks often exploit memory errors to gain control over the execution of vulnerable programs. These attacks remain a serious problem despite previous research on techniques to pr...
Periklis Akritidis, Cristian Cadar, Costin Raiciu,...
140
Voted
FTDCS
2003
IEEE
15 years 8 months ago
Situation-Aware Contract Specification Language for Middleware for Ubiquitous Computing
Ubicomp applications are characterized as situationaware, frequently-and-ephemerally-communicated and QoS-properties-associated. Using middleware to provide multiple QoS support f...
Stephen S. Yau, Yu Wang, Dazhi Huang, Hoh Peter In
118
Voted
ICCS
2001
Springer
15 years 8 months ago
Capacity and Capability Computing Using Legion
Computational Scientists often cannot easily access the large amounts of resources their applications require. Legion is a collection of software services that facilitate the secur...
Anand Natrajan, Marty Humphrey, Andrew S. Grimshaw
144
Voted
CRYPTO
2005
Springer
135views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
We present a constant-round protocol for general secure multiparty computation which makes a black-box use of a pseudorandom generator. In particular, the protocol does not requir...
Ivan Damgård, Yuval Ishai