Sciweavers

706 search results - page 83 / 142
» Trust management for IPsec
Sort
View
AINA
2007
IEEE
15 years 6 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
CCGRID
2007
IEEE
15 years 6 months ago
Executing Large Parameter Sweep Applications on a Multi-VO Testbed
Applications that span multiple virtual organizations (VOs) are of great interest to the eScience community. However, recent attempts to execute large-scale parameter sweep applic...
Shahaan Ayyub, David Abramson, Colin Enticott, Sla...
HICSS
2006
IEEE
117views Biometrics» more  HICSS 2006»
15 years 6 months ago
The Role of Virtual Distance in Innovation and Success
Although prior research has tended to dichotomize work teams as virtual or nonvirtual, most project teams today involve some mix of face-to-face and virtual interaction. We develo...
Karen Sobel Lojeski, Richard Reilly, Peter Dominic...
DISCEX
2003
IEEE
15 years 5 months ago
MYSEA Technology Demonstration
The MYSEA project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mechanis...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
WECWIS
2003
IEEE
97views ECommerce» more  WECWIS 2003»
15 years 5 months ago
Auctions with Untrustworthy Bidders
The paper analyzes auctions which are not completely enforceable. In such auctions, economic agents may fail to carry out their obligations, and parties involved cannot rely on ex...
Sviatoslav Braynov, Tuomas Sandholm