Sciweavers

878 search results - page 111 / 176
» A Compiler-Based Approach to Data Security
Sort
View
BIOSURVEILLANCE
2007
Springer
15 years 6 months ago
High Performance Computing for Disease Surveillance
Abstract. The global health, threatened by emerging infectious diseases, pandemic influenza, and biological warfare, is becoming increasingly dependent on the rapid acquisition, p...
David W. Bauer, Brandon W. Higgs, Mojdeh Mohtashem...
OOPSLA
2007
Springer
15 years 6 months ago
Democratizing the cloud
Programming distributed data-intensive web and mobile applications is gratuitously hard. As the world is moving more and more towards the software as services model, we have to co...
Erik Meijer
ICDCS
2006
IEEE
15 years 6 months ago
Robust Accounting in Decentralized P2P Storage Systems
A peer-to-peer (P2P) storage system allows a network of peer computers to increase the availability of their data by replicating it on other peers in the network. In such networks...
Ivan Osipkov, Peng Wang, Nicholas Hopper
SPW
2004
Springer
15 years 5 months ago
Authentication Components: Engineering Experiences and Guidelines
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Pasi Eronen, Jari Arkko
CCS
1998
ACM
15 years 4 months ago
A Specification of Java Loading and Bytecode Verification
This paper gives a mathematical specification the Java Virtual Machine (JVM) bytecode verifier. The specification is an axiomatic description of the verifier that makes precise su...
Allen Goldberg