Sciweavers

1229 search results - page 89 / 246
» Trusted Computing
Sort
View
CCS
2006
ACM
15 years 1 months ago
Scalable group communication system for scalable trust
Programmers of large-scale trusted systems need tools to simplify tasks such as replicating services or data. Group communication systems achieve this via various flavors of relia...
Krzysztof Ostrowski, Kenneth P. Birman
CSREASAM
2006
14 years 11 months ago
Stochastic Modeling of Worm Propagation in Trusted Networks
- There are two types of models useful in the study of worm propagation for a given number of terminals in a trusted network i.e. deterministic and stochastic model. The determinis...
Vivek Kumar Sehgal
PLDI
2006
ACM
15 years 3 months ago
Specifying distributed trust management in LolliMon
We propose the monadic linear logic programming language LolliMon as a new foundation for the specification of distributed trust management systems, particularly the RT framework...
Jeff Polakow, Christian Skalka
ICSE
2003
IEEE-ACM
15 years 10 months ago
The Grand Challenge of Trusted Components
Reusable components equipped with strict guarantees of quality can help reestablish software development on a stronger footing, by taking advantage of the scaling effect of reuse ...
Bertrand Meyer
DEXAW
2006
IEEE
123views Database» more  DEXAW 2006»
15 years 1 months ago
Privacy, Security and Trust in P2P environments: A Perspective
The Peer-to-Peer (P2P) paradigm of computing has been growing dramatically in popularity over the last decade. Consequently, large amounts of data are being shared among P2P users...
Anirban Mondal, Masaru Kitsuregawa