Sciweavers

248 search results - page 31 / 50
» Manageable fine-grained information flow
Sort
View
EUROPKI
2009
Springer
14 years 7 months ago
ABUSE: PKI for Real-World Email Trust
Current PKI-based email systems (such as X.509 S/MIME and PGP/ MIME) potentially enable a recipient to determine a name and organizational affiliation of the sender. This informati...
Chris Masone, Sean W. Smith
CCS
2008
ACM
14 years 11 months ago
Avoiding timing channels in fixed-priority schedulers
A practically feasible modification to fixed-priority schedulers allows to avoid timing channels despite threads having access to precise clocks. This modification is rather simpl...
Marcus Völp, Claude-Joachim Hamann, Hermann H...
ECMAST
1997
Springer
172views Multimedia» more  ECMAST 1997»
15 years 1 months ago
A Multicast Network Architecture for Large Scale Collaborative Virtual Environments
This paper introduces a multicast based architecture for supporting large scale Collaborative Virtual Environments (CVEs). The paper begins by defining CVEs, discussing the motivat...
Chris Greenhalgh, Steve Benford
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
15 years 4 months ago
Quantifying IT Value Latency: The Case of the Financial Services Industry
Both the academia and practice recognize that information technology (IT) investments may not yield immediate benefits. Nevertheless, there has been a lack of methodological devel...
Kim Huat Goh, Robert J. Kauffman
ITNG
2006
IEEE
15 years 3 months ago
Contextual Events Framework in RFID System
Radio Frequency Identification (RFID) technology is considered to be the next step in the revolution of supplychain management, retail, and beyond. To derive real benefit from RFI...
Mikyeong Moon, Youngbong Kim, Keunhyuk Yeom