Sciweavers

2139 search results - page 100 / 428
» Distributed computing and computer security education
Sort
View
CORR
2010
Springer
112views Education» more  CORR 2010»
15 years 2 months ago
Cooperative Automated Worm Response and Detection Immune Algorithm
The role of T-cells within the immune system is to confirm and assess anomalous situations and then either respond to or tolerate the source of the effect. To illustrate how these ...
Jungwon Kim, William O. Wilson, Uwe Aickelin, Juli...
121
Voted
CORR
2010
Springer
146views Education» more  CORR 2010»
15 years 2 months ago
Liberalizing Dependency
Abstract. The dependency core calculus (DCC), a simple extension of the computational lambda calculus, captures a common notion of dependency that arises in many programming langua...
Avik Chaudhuri
121
Voted
TOCS
2002
70views more  TOCS 2002»
15 years 2 months ago
Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untruste...
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom,...
112
Voted
ICCS
2004
Springer
15 years 8 months ago
Global Discovery Service for JMX Architecture
Distributed computing in wide area networks requires special approach to solve the problem of communication between secure areas. Since there is no possibility to establish connect...
Jacek Midura, Kazimierz Balos, Krzysztof Zielinski
105
Voted
NDSS
2009
IEEE
15 years 9 months ago
Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...
Hong Chen, Ninghui Li, Ziqing Mao