Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
This paper deals with a new approach to build a completely distributed and decentralized Intrusion Detection and Response System (IDRS) in computer networks. This approach is call...
Data state in a data management system such as a database is the result of the transactions performed on that data management system. Approaches such as single-message transaction...
Shel Finkelstein, Thomas Heinzel, Rainer Brendle, ...
This paper is a proposal for a new two-tier calculus, designed to model aspects of CORBA-like systems at the CORBA evel. The higher object level known as Oompa abstracts away from...
Malcolm Tyrrell, Andrew Butterfield, Alexis Donnel...
The era of parallel computing for the masses is here, but writing correct parallel programs remains far more difficult than writing sequential programs. Aside from a few domains,...