Sciweavers

981 search results - page 141 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
SIGOPS
2008
146views more  SIGOPS 2008»
15 years 1 months ago
Vigilant: out-of-band detection of failures in virtual machines
What do our computer systems do all day? How do we make sure they continue doing it when failures occur? Traditional approaches to answering these questions often involve inband m...
Dan Pelleg, Muli Ben-Yehuda, Richard Harper, Lisa ...
SIGOPSE
1994
ACM
15 years 5 months ago
New Directions for Integrated Circuit Cards Operating Systems
Integrated circuit cards or smart cards are now well-known. Applications such as electronic purses (cash units stored in cards), subscriber identification cards used in cellular te...
Pierre Paradinas, Jean-Jacques Vandewalle
SIGMOD
1999
ACM
135views Database» more  SIGMOD 1999»
15 years 5 months ago
Improving OLTP Data Quality Using Data Warehouse Mechanisms
Research and products for the integration of heterogeneous legacy source databases in data warehousing have addressed numerous data quality problems in or between the sources. Suc...
Matthias Jarke, Christoph Quix, Guido Blees, Dirk ...
ACMICEC
2004
ACM
148views ECommerce» more  ACMICEC 2004»
15 years 7 months ago
A secure and private clarke tax voting protocol without trusted authorities
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
Changjie Wang, Ho-fung Leung
TRUST
2009
Springer
15 years 8 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi