Sciweavers

2281 search results - page 116 / 457
» Security Patterns and Secure Systems Design
Sort
View
115
Voted
NETGAMES
2006
ACM
15 years 6 months ago
Network game design: hints and implications of player interaction
While psychologists analyze network game-playing behavior in terms of players’ social interaction and experience, understanding user behavior is equally important to network res...
Kuan-Ta Chen, Chin-Laung Lei
126
Voted
SIGOPS
2011
210views Hardware» more  SIGOPS 2011»
14 years 7 months ago
Small trusted primitives for dependable systems
Secure, fault-tolerant distributed systems are difficult to build, to validate, and to operate. Conservative design for such systems dictates that their security and fault toleran...
Petros Maniatis, Byung-Gon Chun
NDSS
2000
IEEE
15 years 4 months ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song
124
Voted
TDSC
2010
160views more  TDSC 2010»
14 years 7 months ago
Dual-Quorum: A Highly Available and Consistent Replication System for Edge Services
This paper introduces dual-quorum replication, a novel data replication algorithm designed to support Internet edge services. Edge services allow clients to access Internet service...
Lei Gao, Michael Dahlin, Jiandan Zheng, Lorenzo Al...
EVOTING
2004
171views Hardware» more  EVOTING 2004»
15 years 1 months ago
Towards Remote E-Voting: Estonian case
: This paper gives an overview about the Estonian e-voting system. Paper discusses how the concept of e-voting system is designed to resist some of the main challenges of remote e-...
Epp Maaten