Learn More
Information security is important in proportion to an organization's dependence on information technology. When an organization's information is exposed to risk, the use of information security technology is obviously appropriate. Current information security technology, however, deals with only a small fraction of the problem of information risk. In fact,(More)
In an attempt to understand the histogenesis and evolution of port wine stains (PWS), 100 patients with PWS were biopsied; the gross features of each lesion and the patient's associated clinical characteristics were recorded. A detailed analysis of each biopsy including both vessel and nonvessel parameters was made with the assistance of a computer. The(More)
To date, no criteria exist for anticipating the response of a port wine stain to argon laser therapy. In an effort to determine such predictive factors, the preceding study was undertaken. Sixty-two patients, ages 7 to 66 years, with port wine stains were biopsied, had a small test area treated, and were evaluated after 4 months. A desirable result, defined(More)
Mobile code is an exciting new technology. By its very nature, however, it is fraught with inherent security risks. In the paper, we give an overview of some of the techniques for securing mobile code environments that have been suggested and deployed. We examine the sandbox approach, code signing, hybrid approaches, rewalling techniques and proof carrying(More)
Project Athena, established in 1983 to improve the quality of education at MIT (Massachussetts Institute of Technology) by providing campuswide, high-quality computing based on a large network of workstations, is discussed, focusing on the design of Athena's distributed workstation system. The requirements of the system are outlined distributed system(More)
Maintaining, managing, and supporting an unbounded number of distributed network services on multiple server instances requires new solutions. Moira, the Athena Service Management System provides centralized control of data administration, a protocol for interface to the database, tools for accessing and modifying the database, and an automated mechanism(More)
Developing security methods for the Web is a daunting task, in part because security concerns arose after the fact. Today, with an internationally connected user network and rapidly expanding Web functionality, reliability and security are critical. Vendors engaged in retrofitting security must contend with the Web environment's peculiarities, which include(More)
In view of theoretical concern that psoralen ultraviolet A radiation (PUVA) therapy might induce a systemic lupus erythematosus-like syndrome, we studied serum antinuclear antibodies (ANAs) in patients with psoriasis who received PUVA and are participating in a five-year prospective study. At 14 centers, 1,023 patients had two or more ANA determinations.(More)