-
1
-
-
57349096210
-
Genetic algorithm based schedulers for grid computing systems
-
F. Xhafa, J. Carretero and A. Abraham, Genetic algorithm based schedulers for grid computing systems, International Journal of Innovative Computing, Information and Control, vol.3, no.5, pp. 1053- 1071, 2007.
-
(2007)
International Journal of Innovative Computing, Information and Control
, vol.3
, Issue.5
, pp. 1053-1071
-
-
Xhafa, F.1
Carretero, J.2
Abraham, A.3
-
2
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
Springer-Verlag
-
T. Sander and C. F. Tschudin, Protecting mobile agents against malicious hosts, Mobile Agents and Security - Lecture Notes in Computer Science, Springer-Verlag, vol.1419, pp.44-60, 1998.
-
(1998)
Mobile Agents and Security - Lecture Notes in Computer Science
, vol.1419
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.F.2
-
3
-
-
0003249402
-
Environmental key generation towards clueless agents
-
Springer-Verlag
-
J. Riordan and B. Schneier, Environmental key generation towards clueless agents, Mobile Agents and Security - Lecture Notes in Computer Science, Springer-Verlag, vol.1419, pp. 15-24, 1998.
-
(1998)
Mobile Agents and Security - Lecture Notes in Computer Science
, vol.1419
, pp. 15-24
-
-
Riordan, J.1
Schneier, B.2
-
4
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
Springer-Verlag
-
F. Hohl, Time limited blackbox security: Protecting mobile agents from malicious hosts, Mobile Agents and Security - Lecture Notes in Computer Science, Springer-Verlag, vol.1419, pp.92-113, 1998.
-
(1998)
Mobile Agents and Security - Lecture Notes in Computer Science
, vol.1419
, pp. 92-113
-
-
Hohl, F.1
-
5
-
-
79251578513
-
On the (Im)possibility of obfuscating programs
-
Springer-Verlag
-
B. Barak, O. Goldreich, R. Impagliazzo, et al., On the (Im)possibility of obfuscating programs, Advances in Cryptology-CRYPTO 2001 -Lecture Notes in Computer Science, Springer-Verlag, vol.2139, pp.1-18, 2001.
-
(2001)
Advances in Cryptology-CRYPTO 2001 -Lecture Notes in Computer Science
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
-
6
-
-
0038223020
-
Forward integrity for secure audit logs,
-
Technical Report, Computer Science and Engineering Department, University of California at San Diego
-
M. Bellare and B. S. Yee, Forward integrity for secure audit logs, Technical Report, Computer Science and Engineering Department, University of California at San Diego, 1997.
-
(1997)
-
-
Bellare, M.1
Yee, B.S.2
-
8
-
-
84867304375
-
Ensuring the integrity of agentbased computations by short proofs
-
Springer-Verlag
-
I. Biehl, B. Meyer and S. Wetzel, Ensuring the integrity of agentbased computations by short proofs, Proc. of the 2th International Workshop on Mobile Agents - Lecture Notes in Computer Science, Springer-Verlag, vol.1477, pp. 183-194, 1998.
-
(1998)
Proc. of the 2th International Workshop on Mobile Agents - Lecture Notes in Computer Science
, vol.1477
, pp. 183-194
-
-
Biehl, I.1
Meyer, B.2
Wetzel, S.3
-
9
-
-
10844229866
-
Detecting attacks on mobile agents
-
Monterey, California, USA, pp
-
C. Meadows, Detecting attacks on mobile agents, Proc. of DARPA Workshop on Foundations for Secure Mobile Code, Monterey, California, USA, pp.50-56, 1997.
-
(1997)
Proc. of DARPA Workshop on Foundations for Secure Mobile Code
, pp. 50-56
-
-
Meadows, C.1
-
11
-
-
12444268992
-
Fault-tolerant scheduling policy for grid computing systems
-
Santa Fe, New Mexico, USA, pp
-
J. H. Abawajy, Fault-tolerant scheduling policy for grid computing systems, Proc. of the IEEE 18th International Parallel and Distributed Processing Symposium, Santa Fe, New Mexico, USA, pp.238- 244, 2004.
-
(2004)
Proc. of the IEEE 18th International Parallel and Distributed Processing Symposium
, pp. 238-244
-
-
Abawajy, J.H.1
-
13
-
-
33644651224
-
A combined hardware and software architecture for secure computing
-
Ischia, Italy, pp
-
J. Platte and E. Naroska, A combined hardware and software architecture for secure computing, Proc. of the 2nd Conference on Computing Frontiers, Ischia, Italy, pp.280-288, 2005.
-
(2005)
Proc. of the 2nd Conference on Computing Frontiers
, pp. 280-288
-
-
Platte, J.1
Naroska, E.2
-
14
-
-
34247211734
-
A multipolicy authorization framework for grid security
-
Cambridge, USA, pp
-
B. Lang, I. Foster, F. Siebenlist, et al., A multipolicy authorization framework for grid security, Proc. of the 5th IEEE International Symposium on Network Computing and Applications, Cambridge, USA, pp.269-272, 2006.
-
(2006)
Proc. of the 5th IEEE International Symposium on Network Computing and Applications
, pp. 269-272
-
-
Lang, B.1
Foster, I.2
Siebenlist, F.3
-
15
-
-
84948464190
-
Integrating trust into grid resource management systems
-
Vancouver, British Columbia, Canada, pp
-
F. Azzedin and M. Msheswaran, Integrating trust into grid resource management systems, Proc. of the 2002 International Conference on Parallel Processing, Vancouver, British Columbia, Canada, pp.47-54, 2002.
-
(2002)
Proc. of the 2002 International Conference on Parallel Processing
, pp. 47-54
-
-
Azzedin, F.1
Msheswaran, M.2
-
16
-
-
33745821985
-
Information flow analysis for a typed assembly language with polymorphic stacks
-
Springer-Verlag
-
E. Bonelli, A. Compagnoni and R. Medel, Information flow analysis for a typed assembly language with polymorphic stacks, Construction and Analysis of Safe, Secure and Interoperable Smart devices - Lecture Notes in Computer Science, Springer-Verlag, vol.3956, pp.37-56, 2006.
-
(2006)
Construction and Analysis of Safe, Secure and Interoperable Smart devices - Lecture Notes in Computer Science
, vol.3956
, pp. 37-56
-
-
Bonelli, E.1
Compagnoni, A.2
Medel, R.3
-
17
-
-
0037251378
-
Language-based information-flow security
-
A. Sabelfeld and A. C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, no.l, pp.5-19, 2003.
-
(2003)
IEEE Journal on Selected Areas in Communications
, vol.21
, Issue.L
, pp. 5-19
-
-
Sabelfeld, A.1
Myers, A.C.2
-
18
-
-
77954422276
-
-
Trusted Computing Group TCG
-
Trusted Computing Group (TCG), Trusted Platform Modules Strengthen User and Platform Authenticity, 2005. https://www.trustedcomputinggroup.org/ specs/TPM/Whitepaper-TPMs-Strengthen-User-and-Plat- form-Authenticity-Final-l-0. pdf
-
(2005)
Trusted Platform Modules Strengthen User and Platform Authenticity
-
-
|