Sciweavers

2139 search results - page 237 / 428
» Distributed computing and computer security education
Sort
View
128
Voted
STOC
2002
ACM
159views Algorithms» more  STOC 2002»
16 years 3 months ago
On the composition of authenticated byzantine agreement
A fundamental problem of distributed computing is that of simulating a secure broadcast channel, within the setting of a point-to-point network. This problem is known as Byzantine...
Yehuda Lindell, Anna Lysyanskaya, Tal Rabin
127
Voted
ARCS
2006
Springer
15 years 7 months ago
Safety, Liveness, and Information Flow: Dependability Revisited
Abstract: We present a formal framework to talk and reason about dependable systems. The framework is based on three distinct classes of (system specification) properties we call s...
Zinaida Benenson, Felix C. Freiling, Thorsten Holz...
136
Voted
GPC
2008
Springer
15 years 4 months ago
Middleware Integration and Deployment Strategies for Cyberinfrastructures
Virtual Organizations require infrastructure that meets their scientific needs. Traditionally, a VO can require access to computational backends that are suited for interactive app...
Sebastien Goasguen, Krishna Madhavan, David Wolins...
135
Voted
WPES
2006
ACM
15 years 9 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
GCC
2009
Springer
15 years 1 months ago
Interfaces for Placement, Migration, and Monitoring of Virtual Machines in Federated Clouds
Current cloud computing infrastructure offerings are lacking in interoperability, which is a hindrance to the advancement and adoption of the cloud computing paradigm. As clouds ar...
Erik Elmroth, Lars Larsson