Sciweavers

2517 search results - page 229 / 504
» Secure Deployment of Components
Sort
View
LISA
2001
15 years 5 months ago
TemplateTree II: The Post-Installation Setup Tool
After installing an OS distribution, a computer is generally not yet properly adapted to go into production at the local site. Security policies must be implemented, local service...
Tobias Oetiker
CN
2006
81views more  CN 2006»
15 years 4 months ago
Taxonomy of trust: Categorizing P2P reputation systems
The field of peer-to-peer reputation systems has exploded in the last few years. Our goal is to organize existing ideas and work to facilitate system design. We present a taxonomy...
Sergio Marti, Hector Garcia-Molina
ACSAC
2000
IEEE
15 years 8 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
VIS
2007
IEEE
126views Visualization» more  VIS 2007»
16 years 5 months ago
A Unified Paradigm for Scalable Multi-Projector Displays
We present a general framework for the modeling and optimization of scalable multi-projector displays. Based on this framework, we derive algorithms that can robustly optimize the ...
Niranjan Damera-Venkata, Nelson L. Chang, Jeffre...
WWW
2007
ACM
16 years 5 months ago
Providing session management as core business service
It is extremely hard for a global organization with services over multiple channels to capture a consistent and unified view of its data, services, and interactions. While SOA and...
Ismail Ari, Jun Li, Riddhiman Ghosh, Mohamed Dekhi...