Sciweavers

6195 search results - page 184 / 1239
» Cloud Computing Security
Sort
View
WSCG
2003
148views more  WSCG 2003»
15 years 5 months ago
The Second Order Particle System
In this paper we present an extension to the classical particle system. We unify particles, particle sources, and force generators into a second order particle system. In the seco...
Tommi Ilmonen, Janne Kontkanen
JUCS
2010
114views more  JUCS 2010»
14 years 11 months ago
On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
: One of the most important use-cases of Trusted Computing is Remote Attestation. It allows platforms to get a trustworthy proof of the loaded software and current configuration of...
Kurt Dietrich
JCS
2011
156views more  JCS 2011»
14 years 11 months ago
Securing low-cost RFID systems: An unconditionally secure approach
We explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authenticat...
Basel Alomair, Loukas Lazos, Radha Poovendran
ACSAC
2009
IEEE
15 years 11 months ago
Computer-Related Risk Futures
: This paper reflects on many risks in the development and use of computer-related systems. It considers past and future alternatives, suggests some remedial approaches, and offe...
Peter G. Neumann
SP
2002
IEEE
144views Security Privacy» more  SP 2002»
15 years 4 months ago
ARMS: An agent-based resource management system for grid computing
provide a scalable and adaptable abstraction of the system architecture. Each agent is able to cooperate with other agents and thereby provide service advertisement and discovery f...
Junwei Cao, Stephen A. Jarvis, Subhash Saini