Learn More
Information security is important in proportion to an organization's dependence on information technology. When an organization's information is exposed to risk, the use of information security technology is obviously appropriate. Current information security technology, however, deals with only a small fraction of the problem of information risk. In fact,(More)
Mobile code is an exciting new technology. By its very nature, however, it is fraught with inherent security risks. In the paper, we give an overview of some of the techniques for securing mobile code environments that have been suggested and deployed. We examine the sandbox approach, code signing, hybrid approaches, rewalling techniques and proof carrying(More)
In an attempt to understand the histogenesis and evolution of port wine stains (PWS), 100 patients with PWS were biopsied; the gross features of each lesion and the patient's associated clinical characteristics were recorded. A detailed analysis of each biopsy including both vessel and nonvessel parameters was made with the assistance of a computer. The(More)
Project Athena, established in 1983 to improve the quality of education at MIT (Massachussetts Institute of Technology) by providing campuswide, high-quality computing based on a large network of workstations, is discussed, focusing on the design of Athena's distributed workstation system. The requirements of the system are outlined distributed system(More)
Maintaining, managing, and supporting an unbounded number of distributed network services on multiple server instances requires new solutions. Moira, the Athena Service Management System provides centralized control of data administration, a protocol for interface to the database, tools for accessing and modifying the database, and an automated mechanism(More)
To date, no criteria exist for anticipating the response of a port wine stain to argon laser therapy. In an effort to determine such predictive factors, the preceding study was undertaken. Sixty-two patients, ages 7 to 66 years, with port wine stains were biopsied, had a small test area treated, and were evaluated after 4 months. A desirable result, defined(More)
Developing security methods for the Web is a daunting task, in part because security concerns arose after the fact. Today, with an internationally connected user network and rapidly expanding Web functionality, reliability and security are critical. Vendors engaged in retrofitting security must contend with the Web environment's peculiarities, which include(More)
Studies have shown port-wine stains (PWSs) probably represent an aneurysmal dilation and ectasia of the cutaneous vascular plexus. The abnormal vessels are largely included within a 0.6-mm subepidermal zone, which is within the argon laser destruction range. Twenty-eight patients with PWSs underwent biopsies prior to argon laser treatment and repeated(More)