Sciweavers

2654 search results - page 419 / 531
» Accessing the deep web
Sort
View
COMPSEC
2006
141views more  COMPSEC 2006»
14 years 11 months ago
Comparing Java and .NET security: Lessons learned and missed
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
GRID
2006
Springer
14 years 11 months ago
ROAM: An Authorization Manager for Grids
The Resource Oriented Authorization Manager (ROAM) was created to provide a simple but flexible authorization system for the FusionGrid computational grid. ROAM builds on and exte...
Justin Burruss, T. W. Fredian, Mary R. Thompson
JCSS
2008
96views more  JCSS 2008»
14 years 11 months ago
Stateless data concealment for distributed systems
With the growing number of Web applications and their variety, the need to prevent unauthorised access to data and to ensure data integrity in distributed systems has led to an in...
Rachid Anane, Sukhvir Dhillon, Behzad Bordbar
EG
2007
86views more  EG 2007»
14 years 11 months ago
Towards secure online elections: models, primitives and open issues
: Electronic voting may be a feasible option for several election environments, from closed-group elections to nation-wide elections. Especially with online voting, people will be ...
Emmanouil Magkos, Panayiotis Kotzanikolaou, Christ...
ENTCS
2007
78views more  ENTCS 2007»
14 years 11 months ago
PEPA Queues: Capturing Customer Behaviour in Queueing Networks
Queueing network formalisms are very good at describing the spatial movement of customers, but typically poor at describing how customers change as they move through the network. ...
Ashok Argent-Katwala, Jeremy T. Bradley