Sciweavers

1168 search results - page 207 / 234
» The Role of Trust Management in Distributed Systems Security
Sort
View
70
Voted
HICSS
2003
IEEE
84views Biometrics» more  HICSS 2003»
15 years 5 months ago
Constructing Electronic Marketplaces using Peer-to-Peer Technology
Due to the widespread appearance of filesharing systems like Napster, the peer-to-peer concept has recently become well known. So far, these file-sharing systems have been used fo...
Nick Gehrke, Matthias Schumann
EDBTW
2010
Springer
15 years 6 months ago
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...
COMPSAC
2005
IEEE
15 years 5 months ago
Using Aspect Oriented Techniques to Support Separation of Concerns in Model Driven Development
Model driven development (MDD) tackles software complexity through the use of models. However, managing relationships and specifying transformations models at various levels of ab...
Arnor Solberg, Devon M. Simmonds, Raghu Reddy, Sud...
ASPLOS
1998
ACM
15 years 4 months ago
A Cost-Effective, High-Bandwidth Storage Architecture
This paper describes the Network-Attached Secure Disk (NASD) storage architecture, prototype implementations of NASD drives, array management for our architecture, and three files...
Garth A. Gibson, David Nagle, Khalil Amiri, Jeff B...
VTC
2010
IEEE
147views Communications» more  VTC 2010»
14 years 10 months ago
Performance Evaluation of Mobile Multicast Session Initialization Techniques for Remote Software Upload in Vehicle ECUs
— Updating software in vehicle Electronic Control Units (ECUs) will become a mandatory requirement for a variety of reasons, for examples, to update functionality of an existing ...
Irina Hossain, Syed Masud Mahmud, Moon Ho Hwang