Sciweavers

374 search results - page 44 / 75
» Towards Secure and Scalable Computation in Peer-to-Peer Netw...
Sort
View
EMSOFT
2005
Springer
15 years 5 months ago
Deeply embedded XML communication: towards an interoperable and seamless world
Current consumer electronics devices do not interoperate and are hard to use. Devices use proprietary, device-specific and inflexible protocols. Resources across device classes, s...
Johannes Helander
SIGCSE
2010
ACM
183views Education» more  SIGCSE 2010»
15 years 6 months ago
Electronic commerce virtual laboratory
Website security is essential for successful e-commerce ventures, but the vital “how-to” components of security are often lacking in academic courses. This paper describes our...
Joel Coffman, Alfred C. Weaver
AINA
2007
IEEE
15 years 3 months ago
Itinerary-Based Access Control for Mobile Tasks in Scientific Workflows
Current scientific workflow models require datasets to be transferred from their source to the hosts where they can be processed. This seriously impedes data-intensive application...
Zijiang Yang, Shiyong Lu, Ping Yang
TDSC
2008
125views more  TDSC 2008»
14 years 11 months ago
Trustworthy Computing under Resource Constraints with the DOWN Policy
Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use today, albeit limited predominantly to scenarios where constraints on cost is not a seriou...
Mahalingam Ramkumar
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
15 years 3 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...