Sciweavers

210 search results - page 21 / 42
» 20 Years of Operating Systems Security
Sort
View
AICCSA
2008
IEEE
222views Hardware» more  AICCSA 2008»
13 years 9 months ago
Managing access and flow control requirements in distributed workflows
Abstract. Workflows are operational business processes. Workfow Management Systems (WFMS) are concerned with the control and coordination of these workflows. In recent years, there...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...
IMC
2006
ACM
14 years 1 months ago
Finding diversity in remote code injection exploits
Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a method...
Justin Ma, John Dunagan, Helen J. Wang, Stefan Sav...
HOTNETS
2010
13 years 2 months ago
How to tell an airport from a home: techniques and applications
Today's Internet services increasingly use IP-based geolocation to specialize the content and service provisioning for each user. However, these systems focus almost exclusiv...
Andreas Pitsillidis, Yinglian Xie, Fang Yu, Mart&i...
CCS
2009
ACM
13 years 11 months ago
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks
Despite the many efforts made in recent years to mitigate runtime attacks such as stack and heap based buffer overflows, these attacks are still a common security concern in today...
Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy
VLDB
1994
ACM
126views Database» more  VLDB 1994»
13 years 11 months ago
Building a Laboratory Information System Around a C++-Based Object-Oriented DBMS
MapBase is a laboratory information system that has been supporting a high-throughput genome-mapping operation for the last three years. We chose to build MapBase around a C++-bas...
Nathan Goodman, Steve Rozen, Lincoln Stein