Sciweavers

471 search results - page 71 / 95
» A Flexible Trust Model for Distributed Service Infrastructur...
Sort
View
215
Voted
ICDE
2005
IEEE
100views Database» more  ICDE 2005»
16 years 3 months ago
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
Standard multi-party computation models assume semi-honest behavior, where the majority of participants implement protocols according to specification, an assumption not always pl...
Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket,...
SOCIALCOM
2010
14 years 11 months ago
Secure Wireless Embedded Systems Via Component-based Design
This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure a...
Theis Hjorth, Rune Torbensen
112
Voted
EDBTW
2010
Springer
15 years 7 months ago
ODBIS: towards a platform for on-demand business intelligence services
In recent years, Software-as-a-Service (SaaS) is gaining momentum with more and more successful adoptions. Several companies including some well known names have embraced this new...
Moez Essaidi
MSR
2010
ACM
15 years 7 months ago
The Ultimate Debian Database: Consolidating bazaar metadata for Quality Assurance and data mining
—FLOSS distributions like RedHat and Ubuntu require a lot more complex infrastructures than most other FLOSS projects. In the case of community-driven distributions like Debian, ...
Lucas Nussbaum, Stefano Zacchiroli
CORR
2008
Springer
145views Education» more  CORR 2008»
15 years 1 months ago
Decentralized Overlay for Federation of Enterprise Clouds
This chapter describes Aneka-Federation, a decentralized and distributed system that combines enterprise Clouds, overlay networking, and structured peer-to-peer techniques to crea...
Rajiv Ranjan, Rajkumar Buyya