Sciweavers

6907 search results - page 276 / 1382
» Securing distributed adaptation
Sort
View
127
Voted
PDP
2010
IEEE
15 years 10 months ago
Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices
—Data security is one of the major challenges that prevents the wider acceptance of mobile devices, especially within business and government environments. It is non-trivial to p...
Paolo Gasti, Yu Chen
157
Voted
ICDCS
1998
IEEE
15 years 8 months ago
Experience with Secure Multi-Processing in Java
As Java is the preferred platform for the deployment of network computers, it is appealing to run multiple applications on a single Java desktop. We experimented with using the Ja...
Dirk Balfanz, Li Gong
SBBD
2004
150views Database» more  SBBD 2004»
15 years 6 months ago
Active XML, Security and Access Control
XML and Web services are revolutioning the automatic management of distributed information, somewhat in the same way that HTML, Web browsers and search engines modified human acce...
Serge Abiteboul, Omar Benjelloun, Bogdan Cautis, T...
129
Voted
CN
2010
83views more  CN 2010»
15 years 4 months ago
Secure peer sampling
PuppetCast is a protocol for secure peer sampling in large-scale distributed systems. A peer sampling protocol continuously provides each node in the system with a uniform random ...
Gian Paolo Jesi, Alberto Montresor, Maarten van St...
SPIN
2004
Springer
15 years 10 months ago
Translation from Adapted UML to Promela for CORBA-Based Applications
Nowadays, many distributed applications take advantage of the transparent distributed object systems provided by CORBA middlewares. While greatly reduce the design and coding effo...
Jessica Chen, Hanmei Cui