10 research outputs found

    Watermarking, tamper-proofing, and obfuscation - tools for software protection

    No full text

    Axiomatic and Behavioural Trust

    No full text
    Abstract. Academic discourse on trust is fractured along disciplinary lines. Security theorists routinely use a definition of trust which, apparently, has little in common with any of the definitions of trust that appear in the sociological and psychological literature. In this essay, we extend a recently-proposed framework for the technical analysis of secure systems, so that its notion of trust is roughly congruent with the sociological theories of Parsons, Luhmann, Barber, Lewis and Weigert. This congruent extension suggests some ways in which a computerised system might, appropriately, inspire trust in its non-technical users. Key words: Trust, security analysis, trust management

    Evaluation of Gigabit Ethernet with Java/HORB

    No full text
    We have evaluated a high speed network, Gigabit Ethernet(GbE), with Java/HORB, which means Java and Java-based Distributed Object Technology(DOT). Next generation of data acquisition(DAQ) needs high speed network such as ATM and GbE for data transfer in Level 3 and/or Level 2 trigger of the DAQ at large scale DAQ system like Large Hadron Collider(LHC). When evaluating the basic parameters of GbE, we considered bottleneck of network performance such as TCP buffer size, memory access speed, Maximum Transmission Unit(MTU) and so on. We used network tools called TTCP and Netperf and some Java benchmark programs for evaluating DOTs, namely, HORB, RMI and Voyager. Linux and Windows/NT operating systems Client Computer SW Network Interface Card Gigabit Ethernet Server Computer FIGURE 1. Setup for performance evaluation on PC computers, and Solaris on UltraSPARC workstation were used. MTU had an important role of the data transfer. When 2 Ultra30/Solaris systems via GbE were...\ud \ud Note: as at 14 April 2010, the archival site for this conference proceedings (http://www.hep.net/chep98) redirects to http://www.hep.net/chep95, which contains the proceedings of CHEP'95. http://www.particle.cz/conferences/chep2009/previouscheps.aspx lists the publishers for this series of conferences
    corecore