Sciweavers

1120 search results - page 155 / 224
» Securely sharing neuroimagery
Sort
View
101
Voted
OOPSLA
2009
Springer
15 years 7 months ago
S.P.L.O.T.: software product lines online tools
This paper introduces S.P.L.O.T., a Web-based reasoning and configuration system for Software Product Lines (SPLs). The system benefits from mature logic-based reasoning techniq...
Marcílio Mendonça, Moises Branco, Do...
IEEEARES
2008
IEEE
15 years 7 months ago
How to Open a File and Not Get Hacked
Careless attention to opening files, often caused by problems with path traversal or shared directories, can expose applications to attacks on the file names that they use. In t...
James A. Kupsch, Barton P. Miller
93
Voted
ACSAC
2006
IEEE
15 years 6 months ago
Covert and Side Channels Due to Processor Architecture
Information leakage through covert channels and side channels is becoming a serious problem, especially when these are enhanced by modern processor architecture features. We show ...
Zhenghong Wang, Ruby B. Lee
CCGRID
2006
IEEE
15 years 6 months ago
Policy-Based Access Control Framework for Grid Computing
Grid technology enables access and sharing of data and computational resources across administrative domains. Thus, it is important to provide a uniform access and management mech...
Jin Wu, Chokchai Leangsuksun, Vishal Rampure, Hong...
IEEEARES
2006
IEEE
15 years 6 months ago
An Architecture for Service Discovery Based on Capability Matching
Discovery of service providers that are useful to service requesters is a common problem in large, dynamic serviceoriented systems, such as Grids. Simple service indices do not ad...
Jaka Mocnik, Piotr Karwaczynski