Sciweavers

6907 search results - page 237 / 1382
» Securing distributed adaptation
Sort
View
IEEEARES
2009
IEEE
15 years 2 months ago
Quantitative Analysis of Secure Information Flow via Probabilistic Semantics
We present an automatic analyzer for measuring information flow within software systems. In this paper, we quantify leakage in terms of information theory and incorporate this comp...
Chunyan Mu, David Clark
ATAL
2003
Springer
15 years 9 months ago
A prototype multiAgent network security system
Distributed Internet-based attacks on computer systems are becoming more prevalent. These attacks usually employ some form of automation and involve the compromise of many systems...
Taraka Pedireddy, José M. Vidal
ICCS
2004
Springer
15 years 9 months ago
Global Discovery Service for JMX Architecture
Distributed computing in wide area networks requires special approach to solve the problem of communication between secure areas. Since there is no possibility to establish connect...
Jacek Midura, Kazimierz Balos, Krzysztof Zielinski
GSEM
2004
Springer
15 years 9 months ago
Enhancing Java Grid Computing Security with Resource Control
Abstract. This paper outlines an original Computational Grid deployment protocol which is entirely based on Java, leveraging the portability of this language for distributing custo...
Jarle Hulaas, Walter Binder, Giovanna Di Marzo Ser...
ECOOPW
1999
Springer
15 years 8 months ago
Security Properties of Typed Applets
This paper formalizes the folklore result that strongly-typed applets are more secure than untyped ones. We formulate and prove several security properties that all well-typed app...
Xavier Leroy, François Rouaix