Sciweavers

6195 search results - page 250 / 1239
» Cloud Computing Security
Sort
View
129
Voted
NSDI
2008
15 years 7 months ago
Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model
In this paper, we discuss Bitfrost, the security model developed by the One Laptop Per Child project for its XO laptop computers. Bitfrost implements a number of security measures...
Meredith L. Patterson, Len Sassaman, David Chaum
JERIC
2006
68views more  JERIC 2006»
15 years 5 months ago
Teaching context in information security
: This paper discusses teaching the application of technical idea through non-technical discussions, especially the use of puzzles to engage students. After discussing the need for...
Matt Bishop
ICIP
2001
IEEE
16 years 6 months ago
Analysis of cloudy structures evolution on meteorological satellite acquisitions
This paper concerns the characterization of clouds on meteorological satellite image sequences through points trajectories. These temporal curves can be computed from the result o...
Dominique Béréziat, Isabelle Herlin,...
HICSS
2010
IEEE
162views Biometrics» more  HICSS 2010»
15 years 12 months ago
Risk-Based Decision Support in Service Value Networks
The current trend towards dynamic and highly scalable service provisioning fosters the rise of Software as a Service (SaaS) platforms and so called Compute Clouds. The on-demand p...
Wibke Michalk, Benjamin Blau, Jochen Stö&szli...
DCOSS
2005
Springer
15 years 10 months ago
Database-Centric Programming for Wide-Area Sensor Systems
A wide-area sensor system is a complex, dynamic, resource-rich cloud of Internet-connected sensing devices. In this paper, we propose X-Tree Programming, a novel database-centric ...
Shimin Chen, Phillip B. Gibbons, Suman Nath