Show simple item record

dc.contributor.authorCooper, David A.en_US
dc.date.accessioned2007-04-23T18:07:02Z
dc.date.available2007-04-23T18:07:02Z
dc.date.issued1996-06en_US
dc.identifier.citationhttp://techreports.library.cornell.edu:8081/Dienst/UI/1.0/Display/cul.cs/TR96-1589en_US
dc.identifier.urihttps://hdl.handle.net/1813/7244
dc.description.abstractA large number of distributed applications will soon be implemented for which the inclusion of some form of security will be important. While the programmers who design these applications may have expertise in the application area, they most likely will not be experts in the areas of distributed computing or security. In both of these areas, a firm knowledge of the subject is necessary in order to avoid subtle, hard to detect flaws in design. The Horus system was created to enable the design and implementation of distributed applications. The ultimate goal of this work is to allow for the implementation of efficient distributed applications while hiding many of the problems associated with the design of such applications from the applications programmer. In this paper, we describe work we have done to facilitate the implementation of secure distributed applications on top of the Horus system.en_US
dc.format.extent217108 bytes
dc.format.extent271292 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/postscript
dc.language.isoen_USen_US
dc.publisherCornell Universityen_US
dc.subjectcomputer scienceen_US
dc.subjecttechnical reporten_US
dc.titleSCOM: A Security and Privacy Layer for Horusen_US
dc.typetechnical reporten_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Statistics