Sciweavers

2024 search results - page 11 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
SACMAT
2009
ACM
15 years 8 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
ICWN
2008
15 years 3 months ago
Behavior of Bluetooth Bridging Nodes within an Adaptive Service Providing Environment
In order to demonstrate our research results on managing wireless networks that are used to provide mobile services with a large spectrum of application, we developed the BlueSpot ...
Ulrich Dümichen, Uwe Baumgarten
ACSAC
2009
IEEE
15 years 8 months ago
Enabling Secure Secret Sharing in Distributed Online Social Networks
—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...
115
Voted
EDCC
1994
Springer
15 years 6 months ago
Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach
Security and reliability issues in distributed systems have been investigated for several years at LAAS using a technique called Fragmentation-Redundancy-Scattering (FRS). The aim ...
Jean-Charles Fabre, Yves Deswarte, Brian Randell
OOPSLA
1998
Springer
15 years 6 months ago
JRes: A Resource Accounting Interface for Java
With the spread of the Internet the computing model on server systems is undergoing several important changes. Recent research ideas concerning dynamic operating system extensibil...
Grzegorz Czajkowski, Thorsten von Eicken