Skip to main content

Dartmouth Digital Library Collections

You've searched:

All Collections
  • All fields: untrusted
(13 results)



Display: 50

    • Agent Tcl: a flexible and secure mobile-agent system.

    • Agent Tcl: a flexible and secure mobile-agent system.
    • Intelligent agents (Computer software). ; Electronic data processing -- Distributed processing. ; Tcl (Computer program language). ; Computer networks -- Security measures.
    • A mobile agent is an autonomous program that can migrate under its own control from machine to machine in a heterogeneous network. In other words, the program can suspend its execution at an arbitrary point, transport itself to another machine, and...
    • Efficient I/O for computational grid applications.

    • Efficient I/O for computational grid applications.
    • Computer input-output equipment. ; Computational grids (Computer systems). ; High performance computing. ; Electronic data processing -- Distributed processing.
    • High-performance computing increasingly occurs on computational grids composed of heterogeneous and geographically distributed systems of computers, networks, and storage devices that collectively act as a single virtual computer. A key challenge...
    • Type-safe operating system abstractions.

    • Type-safe operating system abstractions.
    • Operating systems (Computers) -- Security measures. ; Device drivers (Computer programs).
    • Operating systems and low-level applications are usually written in languages like C and assembly, which provide access to low-level abstractions. These languages have unsafe type systems that allow many bugs to slip by programmers. For example, in...
    • SHEMP: secure hardware enhanced MyProxy.

    • SHEMP: secure hardware enhanced MyProxy.
    • Public key infrastructure (Computer security). ; Computer networks -- Security measures. ; Operating systems (Computers). ; Microcomputers.
    • In 1976, Whitfield Diffie and Martin Hellman demonstrated how public key cryptography could enable secure information exchange between parties that do not share secrets. In order for public key cryptography to work in modern distributed...
    • Market-based control of mobile-agent systems.

    • Market-based control of mobile-agent systems.
    • Mobile agents (Computer software). ; Resource allocation -- Mathematical models. ; Computer networks -- Economic aspects.
    • Modern distributed systems scatter sensors, storage, and computation throughout the environment. Ideally these devices communicate and share resources, but there is seldom motivation for a device''s owner to yield control to another user. We...
    • Naming and sharing resources across administrative boundaries.

    • Naming and sharing resources across administrative boundaries.
    • Electronic data processing -- Distributed processing. ; Computer network architectures. ; Programming languages (Electronic computers) -- Semantics. ; Database management.
    • I tackle the problem of naming and sharing resources across administrative boundaries. Conventional systems manifest the hierarchy of typical administrative structure in the structure of their own mechanism. While natural for communication that...
    • Secure context-sensitive authorization.

    • Secure context-sensitive authorization.
    • Computers -- Access control. ; Authentication. ; Ubiquitous computing.
    • Pervasive computing leads to an increased integration between the real world and the computational world, and many applications in pervasive computing adapt to the user's context, such as the location of the user and relevant devices, the presence...
    • Collaborative automated trust negotiation.

    • Collaborative automated trust negotiation.
    • Computer networks -- Security measures. Computers -- Access control.
    • Automated trust negotiation is a new approach to access control and authentication for the open systems such as the Internet, where sensitive interactions sometimes occur among entities with no prior knowledge of each other. Trust negotiation...
    • Hardware-Assisted Secure Computation.

    • Hardware-Assisted Secure Computation.
    • Computer networks -- Security measures. Computer networks -- Access control. Computer network protocols.
    • The theory community has worked on Secure Multiparty Computation (SMC) for more than two decades, and has produced many protocols for many settings. One common thread in these works is that the protocols cannot use a Trusted Third Party (TTP), even...

QuickView

Display a larger image and more item information when the pointer pauses over a thumbnail
on off
 

Layout options:

Thumbnail with title
Grid with smaller thumbnails and more detail
Select the collections to add or remove from your search
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
 
OK