Sciweavers

848 search results - page 67 / 170
» Secure Information Flow for Distributed Systems
Sort
View
DIM
2009
ACM
15 years 6 months ago
Mnikr: reputation construction through human trading of distributed social identities
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is ...
Brendan Francis O'Connor, John Linwood Griffin
CN
2010
83views more  CN 2010»
14 years 11 months ago
Secure peer sampling
PuppetCast is a protocol for secure peer sampling in large-scale distributed systems. A peer sampling protocol continuously provides each node in the system with a uniform random ...
Gian Paolo Jesi, Alberto Montresor, Maarten van St...
ESCIENCE
2005
IEEE
15 years 5 months ago
A Distributed Problem Solving Environment (PSE) for Scientific Computing
A distributed Problem Solving Environment (PSE) is proposed to help users solve partial differential equation (PDE) based problems in scientific computing. The system inputs a pro...
Shigeo Kawata, Hideaki Fuju, Hideaki Sugiura, Yuic...
TISSEC
2010
142views more  TISSEC 2010»
14 years 6 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
14 years 9 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens