Sciweavers

8655 search results - page 265 / 1731
» Challenges for Trusted Computing
Sort
View
ACSAC
2006
IEEE
15 years 9 months ago
Shamon: A System for Distributed Mandatory Access Control
We define and demonstrate an approach to securing distributed computation based on a shared reference monitor (Shamon) that enforces mandatory access control (MAC) policies acros...
Jonathan M. McCune, Trent Jaeger, Stefan Berger, R...
ENTCS
2008
91views more  ENTCS 2008»
15 years 3 months ago
Implementing Real Numbers With RZ
RZ is a tool which translates axiomatizations of mathematical structures to program specifications using the realizability interpretation of logic. This helps programmers correctl...
Andrej Bauer, Iztok Kavkler
JOT
2006
80views more  JOT 2006»
15 years 3 months ago
Remote Job Submission Security
This paper presents the middleware needed to deploy jobs to non-geographically colocated clusters with decentralized look-up severs. We have named our framework the Initium Remote...
Pawel Krepsztul, Douglas A. Lyon
IPPS
2000
IEEE
15 years 7 months ago
An Open Market-Based Architecture for Distributed Computing
One of the challenges in large scale distributed computing is to utilize the thousands of idle personal computers. In this paper, we present a system that enables users to e ortles...
Spyros Lalis, Alexandros Karypidis
99
Voted
CHI
2003
ACM
16 years 3 months ago
Are designers ready for ubiquitous computing?: a formative study
Ubiquitous computing is increasingly becoming reality, even for people outside of research. A group that will have to face the challenges of this new technology is product and ind...
Sara Ljungblad, Tobias Skog, Lalya Gaye