Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Ubisafe Computing: Vision and Challenges (I)

    In recent years, a variety of new computing paradigms have been proposed for various purposes. It is true that many of them intend to and really can gratify some of the people sometime, somewhere; a few of the...

    Jianhua Ma, Qiangfu Zhao, Vipin Chaudhary, **gde Cheng in Autonomic and Trusted Computing (2006)

  2. No Access

    Chapter and Conference Paper

    Application-Level Checkpointing Techniques for Parallel Programs

    In its simplest form, checkpointing is the act of saving a program’s computation state in a form external to the running program, e.g. the computation state is saved to a filesystem. The checkpoint files can t...

    John Paul Walters, Vipin Chaudhary in Distributed Computing and Internet Technology (2006)

  3. No Access

    Chapter

    History-Based Access Control for Mobile Code

    In this chapter, we present a history-based access-control mechanism that is suitable for mediating accesses from mobile code. The key idea behind history-based access-control is to maintain a selective history o...

    Guy Edjlali, Anurag Acharya, Vipin Chaudhary in Secure Internet Programming (1999)