Sciweavers

376 search results - page 18 / 76
» Integrity constraints in trust management
Sort
View
CSE
2009
IEEE
15 years 5 months ago
Hardware Containers for Software Components: A Trusted Platform for COTS-Based Systems
Abstract--Much of modern software development consists of assembling together existing software components and writing the glue code that integrates them into a unified application...
Eugen Leontie, Gedare Bloom, Bhagirath Narahari, R...
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
15 years 6 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speciļ...
William R. Marczak, Shan Shan Huang, Martin Braven...
ACL
1998
15 years 3 months ago
Managing Information at Linguistic Interfaces
A large spoken dialogue translation system imposes both engineering and linguistic constraints on the way in which linguistic information is communicated between modules. We descr...
Johan Bos, C. J. Rupp, Bianka Buschbeck-Wolf, Mich...
HOTDEP
2008
122views Hardware» more  HOTDEP 2008»
15 years 4 months ago
Dependable Self-Hosting Distributed Systems Using Constraints
We describe a technique for writing distributed applications which manage themselves over one or more utility computing infrastructures: by dynamically acquiring new computational...
Qin Yin, Justin Cappos, Andrew Baumann, Timothy Ro...
CSREASAM
2003
15 years 3 months ago
Security Policy Management for Handheld Devices
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new r...
Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, ...