Sciweavers

3299 search results - page 163 / 660
» Privacy and Trusted Computing
Sort
View
ECRIME
2007
15 years 9 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
114
Voted
ACSAC
2009
IEEE
15 years 12 months ago
Computer-Related Risk Futures
: This paper reflects on many risks in the development and use of computer-related systems. It considers past and future alternatives, suggests some remedial approaches, and offe...
Peter G. Neumann
SP
2002
IEEE
144views Security Privacy» more  SP 2002»
15 years 4 months ago
ARMS: An agent-based resource management system for grid computing
provide a scalable and adaptable abstraction of the system architecture. Each agent is able to cooperate with other agents and thereby provide service advertisement and discovery f...
Junwei Cao, Stephen A. Jarvis, Subhash Saini
153
Voted
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
15 years 3 months ago
State-of-the-art in heterogeneous computing
Node level heterogeneous architectures have become attractive during the last decade for several reasons: compared to traditional symmetric CPUs, they offer high peak performance a...
André Rigland Brodtkorb, Christopher Dyken,...
155
Voted
DMG
2005
Springer
15 years 10 months ago
Globally Distributed Data
1 International collaborations now manage globally distributed data collections based on the data and trust virtualization mechanisms provided by the Storage Resource Broker data g...
Reagan W. Moore