Sciweavers

257 search results - page 27 / 52
» Using Replication and Partitioning to Build Secure Distribut...
Sort
View
BSDCON
2003
14 years 11 months ago
An Automated Binary Security Update System for FreeBSD
With the present trend towards increased reliance upon computer systems, the provision and prompt application of security patches is becoming vital. Developers of all operating sy...
Colin Percival
EUROSYS
2006
ACM
15 years 7 months ago
Using queries for distributed monitoring and forensics
Distributed systems are hard to build, profile, debug, and test. Monitoring a distributed system – to detect and analyze bugs, test for regressions, identify fault-tolerance pr...
Atul Singh, Petros Maniatis, Timothy Roscoe, Peter...
SRDS
2003
IEEE
15 years 3 months ago
Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems
Traditional security systems are not easily scalable and can become single points of failure or performance bottlenecks when used on a large-scale distributed system such as the I...
Altair Olivo Santin, Joni da Silva Fraga, Frank Si...
USS
2008
15 years 8 days ago
NetAuth: Supporting User-Based Network Services
In User-Based Network Services (UBNS), the process servicing requests from user U runs under U's ID. This enables (operating system) access controls to tailor service authori...
Manigandan Radhakrishnan, Jon A. Solworth
ADBIS
2000
Springer
169views Database» more  ADBIS 2000»
15 years 2 months ago
Data Organization Issues for Location-Dependent Queries in Mobile Computing
We consider queries which originate from a mobile unit and whose result depends on the location of the user who initiates the query. Example of such a query is How many people are ...
Sanjay Kumar Madria, Bharat K. Bhargava, Evaggelia...