Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
Securing Distributed Computing Against the Hostile Host. John H. Hine. Paul Dagger. School of Mathematics and Computer Science. Victoria University of ...
The paper presents a methodology based on anchors of trust that allowed us to study the security dependencies within a Unix like operating system. We have ...
Abstra t. Distributed omputing is evolving into a olle tion of di erent paradigms that involve multiple organisa- tions. These in lude mobile agents, ...
Missing: Securing | Show results with:Securing
The paper presents a methodology based on anchors of trust that allowed us to study the security dependencies within a Unix like operating system. We have ...
People also ask
Secure distributed computing protocols are built on various basic protocols: • Bit-commitment: A bit commitment protocol simulates the function a sealed ...
When triggered, the code then takes a hostile action against host computer systems. The issues surrounding malicious software such as computer virus are ...
Problems in host-based security exist in three principal areas: application protection, host environment protection, and data protection. These three areas echo ...
To minimize these threats to the clients, turn off Java, JavaScript, browser plug-ins, and ActiveX, if you can. Of course, many useful network sites stop ...
Jun 18, 1998 · A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially ...