Search
Now showing items 1-9 of 9
Geometric approach to Fletcher's ideal penalty function
(1995)
In this note, we derive a geometric formulation of an ideal penalty function for equality constrained problems. This differentiable penalty function requires no parameter estimation or adjustment, has numerical conditioning ...
Hades - towards the design of an asynchronous superscalar processor
(University of Hertfordshire, 1995)
Hades is a processor architecture aimed at single and multiple-instruction-issue asynchronous implementations. This paper uses a baseline version of Hades to illustrate some of the difficulties encountered in asynchronous ...
Roles and rights
(University of Hertfordshire, 1995)
In this paper we describe and discuss a protection model designed by Coulouris and Dollimore to protect objects which are shared by different principals participating in a co-operative task. We then show that the ...
Is your computing environment secure? Security problems with interrupt handling mechanisms
(University of Hertfordshire, 1995)
In an open distributed system, resources must be shared among various users. Security is one of the major issues in designing such a system. When a computer system is connected to a network, it is very important to ensure ...
Remote booting in a hostile world: to whom am I speaking? [Computer security]
(1995)
Today's networked computer systems are very vulnerable to attack: terminal software, like that used by the X Window System, is frequently passed across a network, and a trojan horse can easily be inserted while it is in ...
Authentication v Certification
(University of Hertfordshire, 1995)
Authentication servers and certification authorities are usually viewed simply as alternative ways of providing the same service. In this paper we show that the differences in the natures of these two approaches are more ...
Positive fixed points of lattices under semigroups of positive linear operators
(1995)
Let Z be a Banach lattice endowed with positive cone C and an order-continuous norm ||.||. Let G be a semigroup of positive linear endomorphisms of Z...
Nested signature blocks
(University of Hertfordshire, 1995)
For any signature block and any other data, there exists a key which produces the same signature block. In this report we identify the threat that this poses for the SAProxy scheme which uses nested signature blocks as ...
Key-spoofing attacks on nested signature blocks
(1995)
For a given signature block and any other data, there exists a key which produces the same signature block. The threat that this poses to schemes which use nested signature blocks as pointers to other tokens is identified, ...