Sciweavers

519 search results - page 49 / 104
» How to make secure email easier to use
Sort
View
CONCURRENCY
2008
105views more  CONCURRENCY 2008»
14 years 9 months ago
Coordinating access control in grid services
We describe how to control the cumulative use of distributed grid resources by using coordination aware policy decision points (coordinated PDPs) and an SQL database to hold "...
David W. Chadwick, Linying Su, Romain Laborde
GCC
2005
Springer
15 years 3 months ago
XML-Based Digital Signature Accelerator in Open Mobile Grid Computing
As Grid technology evolves it is becoming evident that the inclusion of mobile devices in a Grid environment will benefit both the Grid and mobile network communities. Many mobile ...
Namje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Ki...
ACSAC
2010
IEEE
14 years 7 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
IOT
2010
14 years 7 months ago
A resource oriented architecture for the Web of Things
Abstract--Many efforts are centered around creating largescale networks of "smart things" found in the physical world (e.g., wireless sensor and actuator networks, embedd...
Dominique Guinard, Vlad Trifa, Erik Wilde
UIST
2006
ACM
15 years 3 months ago
SwingStates: adding state machines to the swing toolkit
This article describes SwingStates, a library that adds state machines to the Java Swing user interface toolkit. Unlike traditional approaches, which use callbacks or listeners to...
Caroline Appert, Michel Beaudouin-Lafon