Sciweavers

2057 search results - page 71 / 412
» Distributed Secure Systems: Then and Now
Sort
View
BMCBI
2006
109views more  BMCBI 2006»
15 years 1 months ago
An integrated system for genetic analysis
Background: Large-scale genetic mapping projects require data management systems that can handle complex phenotypes and detect and correct high-throughput genotyping errors, yet a...
Simon Fiddy, David Cattermole, Dong Xie, Xiao Yuan...
ICMCS
1995
IEEE
115views Multimedia» more  ICMCS 1995»
15 years 4 months ago
Secure Pay-Per-View Testbed
Trials of Video on Demand and Pay-Per-View systems are underway in many countries, and as a result, many cable and telecommunications companies are having to upgrade or replace th...
Dónal Cunningham, Donal O'Mahony
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
15 years 7 months ago
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a ...
Richard Au, Peter Croll
TC
1998
15 years 18 days ago
A Metaobject Architecture for Fault-Tolerant Distributed Systems: The FRIENDS Approach
—The FRIENDS system developed at LAAS-CNRS is a metalevel architecture providing libraries of metaobjects for fault tolerance, secure communication, and group-based distributed a...
Jean-Charles Fabre, Tanguy Pérennou
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
15 years 4 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...