Sciweavers

6555 search results - page 915 / 1311
» Secure attribute-based systems
Sort
View
CONCUR
2001
Springer
15 years 9 months ago
Probabilistic Information Flow in a Process Algebra
We present a process algebraic approach for extending to the probabilistic setting the classical logical information flow analysis of computer systems. In particular, we employ a ...
Alessandro Aldini
ICSE
1993
IEEE-ACM
15 years 9 months ago
Formal Approaches to Software Architecture
Over the past 15 years there has been increasing recognition that careful attention to the design of a system’s software architecture is critical to satisfying its requirements ...
David Garlan
AUTONOMICS
2007
ACM
15 years 9 months ago
Efficient operation in sensor and actor networks inspired by cellular signaling cascades
The investigation and the development of self-organizing systems are especially needed for operation and control in massively distributed systems such as Sensor and Actor Networks...
Falko Dressler, Isabel Dietrich, Reinhard German, ...
IICS
2010
Springer
15 years 8 months ago
Rearchitecting DNS
Abstract. The Domain Name System (DNS) has been the naming service of the Internet for more than 20 years. It is the foundation of virtually all other distributed service. The deï¬...
Gert Pfeifer, Christof Fetzer, Martin Steuer
HPCC
2007
Springer
15 years 8 months ago
Checkpointing Aided Parallel Execution Model and Analysis
Abstract. Checkpointing techniques are usually used to secure the execution of sequential and parallel programs. However, they can also be used in order to generate automatically a...
Laura Mereuta, Éric Renault