Sciweavers

25 search results - page 1 / 5
» acsw 2006
Sort
View
ACSW
2006
13 years 6 months ago
Logcrypt: forward security and public verification for secure audit logs
Logcrypt provides strong cryptographic assurances that data stored by a logging facility before a system compromise cannot be modified after the compromise without detection. We b...
Jason E. Holt
ACSW
2006
13 years 6 months ago
Building computational grids with apple's Xgrid middleware
Apple's release of the Xgrid framework for distributed computing introduces a new technology solution for loosely coupled distributed computation. In this paper systematicall...
Baden Hughes
ACSW
2006
13 years 6 months ago
SKMA: a key management architecture for SCADA systems
Supervisory Control And Data Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity and water distrubution systems. Currently...
Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel ...
ACSW
2006
13 years 6 months ago
An agent-based peer-to-peer grid computing architecture: convergence of grid and peer-to-peer computing
The conventional computing Grid has developed a service oriented computing architecture with a superlocal resource management and scheduling strategy. This architecture is limited...
Jia Tang, Minjie Zhang
ACSW
2006
13 years 6 months ago
Description of bad-signatures for network intrusion detection
Today, a computer network is under constant assault from attacks. In Computer Science, NIDS are used in order to protect a computer network against these intrusions. These systems...
Michael Hilker, Christoph Schommer