Sciweavers

2139 search results - page 73 / 428
» Distributed computing and computer security education
Sort
View
AINA
2006
IEEE
15 years 6 months ago
Property-Based Taming of Lying Mobile Nodes
Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focu...
Mark Manulis, Ahmad-Reza Sadeghi
NSDI
2008
15 years 2 months ago
Securing Distributed Systems with Information Flow Control
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DI...
Nickolai Zeldovich, Silas Boyd-Wickizer, David Maz...
FGR
2008
IEEE
227views Biometrics» more  FGR 2008»
15 years 6 months ago
Ambient intelligence as the bridge to the future of pervasive computing
One prediction about this future of pervasive technology is that people will carry the tools needed to interface with technological resources sprinkled through out the environment...
Christopher Richard Wren, Yuri A. Ivanov
SIGUCCS
2003
ACM
15 years 5 months ago
Creating a professional development program to support a handheld computing initiative
Indiana State University is providing handheld computers to every faculty member in its School of Education. What started as a small pilot program a year ago has grown into a proj...
Kenneth Janz
104
Voted
IJISEC
2007
119views more  IJISEC 2007»
14 years 11 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny