Sciweavers

617 search results - page 22 / 124
» Research Challenges for the Security of Control Systems
Sort
View
ICDE
2005
IEEE
143views Database» more  ICDE 2005»
16 years 1 months ago
Postgres-R(SI): Combining Replica Control with Concurrency Control based on Snapshot Isolation
Replicating data over a cluster of workstations is a powerful tool to increase performance, and provide faulttolerance for demanding database applications. The big challenge in su...
Shuqing Wu, Bettina Kemme
USENIX
2008
15 years 2 months ago
Diverse Replication for Single-Machine Byzantine-Fault Tolerance
New single-machine environments are emerging from abundant computation available through multiple cores and secure virtualization. In this paper, we describe the research challeng...
Byung-Gon Chun, Petros Maniatis, Scott Shenker
CHI
2005
ACM
16 years 5 days ago
Building security and trust in online banking
Growing threats to online banking security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vita...
Maria Nilsson, Anne Adams, Simon Herd
CIG
2005
IEEE
15 years 5 months ago
Pared-down Poker: Cutting to the Core of Command and Control
Poker poses cognitive challenges like those of warfare, business and other real world domains. This makes poker a good test bed for basic research on how people make Command and Co...
Kevin Burns
CSSE
2004
IEEE
14 years 11 months ago
A comparison of modeling strategies in defining XML-based access control languages
One of the most important features of XML-based Web services is that they can be easily accessed over the Internet, but this makes them vulnerable to a series of security threats....
Claudio Agostino Ardagna, Sabrina De Capitani di V...