Sciweavers

3047 search results - page 83 / 610
» A Secure Distributed Search System
Sort
View
SIGCOMM
2010
ACM
15 years 3 months ago
capDL: a language for describing capability-based systems
Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the s...
Ihor Kuz, Gerwin Klein, Corey Lewis, Adam Walker
TELE
2008
85views more  TELE 2008»
15 years 2 months ago
Iris recognition and the challenge of homeland and border control security in UAE
This article discusses the implementation of iris recognition in improving the security of border control systems in the United Arab Emirates. The article explains the significanc...
Ahmad N. Al-Raisi, Ali M. Al-Khouri
TOCS
2002
70views more  TOCS 2002»
15 years 2 months ago
Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untruste...
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom,...
IJISEC
2008
188views more  IJISEC 2008»
15 years 1 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...
AGENTS
2001
Springer
15 years 6 months ago
Configuration management for multi-agent systems
As heterogeneous distributed systems, multi-agent systems present some challenging con guration management issues. There are the problems of knowing how to allocate agents to comp...
Joseph A. Giampapa, Octavio H. Juarez-Espinosa, Ka...