Sciweavers

8655 search results - page 174 / 1731
» Challenges for Trusted Computing
Sort
View
CCR
2007
168views more  CCR 2007»
14 years 10 months ago
Challenges in peer-to-peer gaming
While multi-player online games are very successful, their fast deployment suffers from their server-based architecture. Indeed, servers both limit the scalability of the games a...
Christoph Neumann, Nicolas Prigent, Matteo Varvell...
SIGMETRICS
2010
ACM
103views Hardware» more  SIGMETRICS 2010»
14 years 5 months ago
VM power metering: feasibility and challenges
This paper explores the feasibility of and challenges in developing methods for black-box monitoring of a VM's power usage at runtime, on shared virtualized compute platforms...
Bhavani Krishnan, Hrishikesh Amur, Ada Gavrilovska...
OSDI
2002
ACM
15 years 10 months ago
FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment
Farsite is a secure, scalable file system that logically functions as a centralized file server but is physically distributed among a set of untrusted computers. Farsite provides ...
Atul Adya, William J. Bolosky, Miguel Castro, Gera...
EWSN
2010
Springer
15 years 7 months ago
TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks
Multi-hop routing in wireless sensor networks (WSNs) offers little protection against deception through replaying routing information. This defect can be taken advantage of by an a...
Guoxing Zhan, Weisong Shi, Julia Deng
CCS
2004
ACM
15 years 3 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii