Sciweavers

2726 search results - page 85 / 546
» Application security support in the operating system kernel
Sort
View
CRYPTO
2005
Springer
96views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
Privacy-Preserving Set Operations
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private i...
Lea Kissner, Dawn Xiaodong Song
HICSS
1996
IEEE
136views Biometrics» more  HICSS 1996»
15 years 9 months ago
Design of a Real-Time Co-Operating System for Multiprocessor Workstations
: We have designed a Real-Time Co-Operating System (RTCOS) for simultaneously supporting real-time and non-real-time activities on a workstation with two or more processors. The RT...
Gebran Krikor, Md. Touhidur Raza, David B. Stewart
IEEEARES
2006
IEEE
15 years 11 months ago
A Component Based Software Architecture for E-Government Applications
The raising need for e-government applications leads to many new approaches in this sector. To fulfill the requirement for a flexible government-to-government (G2G) software sys...
Daniel Beer, Raphael Kunis, Gudula Rünger
CCS
2010
ACM
15 years 5 months ago
DIFC programs by automatic instrumentation
Decentralized information flow control (DIFC) operating systems provide applications with mechanisms for enforcing information-flow policies for their data. However, significant o...
William R. Harris, Somesh Jha, Thomas W. Reps
134
Voted
SAFECOMP
2000
Springer
15 years 8 months ago
Expert Error: The Case of Trouble-Shooting in Electronics
An expert trouble-shooter is a subject who has a great deal of experience in his activity that allows him or her to be very efficient. However, the large amount of problems he or s...
Denis Besnard