Sciweavers

3003 search results - page 444 / 601
» Software Security: Building Security In
Sort
View
HPDC
1998
IEEE
15 years 9 months ago
WebOS: Operating System Services for Wide Area Applications
In this paper, we argue for the power of providing a common set of OS services to wide area applications, including mechanisms for resource discovery, a global namespace, remote p...
Amin Vahdat, Thomas E. Anderson, Michael Dahlin, E...
DIM
2007
ACM
15 years 8 months ago
Receipt management- transaction history based trust establishment
In a history-based trust-management system, users and service providers use information about past transactions to make trust-based decisions concerning current transactions. One ...
Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bert...
118
Voted
AAAI
2006
15 years 6 months ago
Bookmark Hierarchies and Collaborative Recommendation
GiveALink.org is a social bookmarking site where users may donate and view their personal bookmark files online securely. The bookmarks are analyzed to build a new generation of i...
Benjamin Markines, Lubomira Stoilova, Filippo Menc...
CONCURRENCY
2002
122views more  CONCURRENCY 2002»
15 years 4 months ago
The Grid Portal Development Kit
Computational science portals are emerging as useful and necessary interfaces for performing operations on the Grid. The Grid Portal Development Kit (GPDK) facilitates the develop...
Jason Novotny
154
Voted
ACSAC
2009
IEEE
15 years 8 months ago
Justifying Integrity Using a Virtual Machine Verifier
Emerging distributed computing architectures, such as grid and cloud computing, depend on the high integrity execution of each system in the computation. While integrity measuremen...
Joshua Schiffman, Thomas Moyer, Christopher Shal, ...