Sciweavers

2281 search results - page 177 / 457
» Security Patterns and Secure Systems Design
Sort
View
108
Voted
ATAL
2004
Springer
15 years 6 months ago
Naming Services in Multi-Agent Systems: A Design for Agent-Based White Pages
Distributed multi-agent systems require naming services to locate and communicate with remote agents. In this paper we focus on the design and implementation of the “White Pages...
Todd Wright
95
Voted
OOPSLA
2007
Springer
15 years 6 months ago
Supporting systems QoS design and evolution through model transformations
We describe Quality of service pICKER (QUICKER), a model-driven QoS mapping toolchain for supporting the QoS design and evolution of systems software. QUICKER automates the mappin...
Amogh Kavimandan, Aniruddha S. Gokhale
93
Voted
SOUPS
2009
ACM
15 years 7 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
87
Voted
COMPUTER
2010
147views more  COMPUTER 2010»
15 years 24 days ago
Authentication by Biometric Verification
:-Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human b...
Ron Vetter
93
Voted
OSDI
2006
ACM
16 years 1 months ago
Making Information Flow Explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
David Mazières, Eddie Kohler, Nickolai Zeld...