Sciweavers

625 search results - page 83 / 125
» Optimal resource allocation for security in reliability syst...
Sort
View
CCS
2008
ACM
14 years 11 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
CSFW
2011
IEEE
13 years 9 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...
EUROSYS
2011
ACM
14 years 1 months ago
Increasing performance in byzantine fault-tolerant systems with on-demand replica consistency
Traditional agreement-based Byzantine fault-tolerant (BFT) systems process all requests on all replicas to ensure consistency. In addition to the overhead for BFT protocol and sta...
Tobias Distler, Rüdiger Kapitza
DAGSTUHL
2006
14 years 11 months ago
A Bayesian Reputation System for Virtual Organizations
Abstract. Virtual Organizations (VOs) are an emerging business model in today's Internet economy. Increased specialization and focusing on an organization's core competen...
Jochen Haller
GRID
2006
Springer
14 years 9 months ago
The Palantir Grid Meta-Information System
Grids allow large scale resource-sharing across different administrative domains. Those diverse resources are likely to join or quit the Grid at any moment or possibly to break dow...
Francesc Guim, Ivan Rodero, M. Tomas, Julita Corba...