Sciweavers

772 search results - page 105 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
ACSW
2003
13 years 10 months ago
Location Management in Pervasive Systems
Pervasive systems require context awareness in order to be able to provide “anywhere, anytime” computing to mobile users. One type of context information is location informati...
Jadwiga Indulska, Peter Sutton
ISCAS
2007
IEEE
161views Hardware» more  ISCAS 2007»
14 years 3 months ago
Hardware Architecture of a Parallel Pattern Matching Engine
Abstract— Several network security and QoS applications require detecting multiple string matches in the packet payload by comparing it against predefined pattern set. This proc...
Meeta Yadav, Ashwini Venkatachaliah, Paul D. Franz...
CODES
2006
IEEE
13 years 11 months ago
Architectural support for safe software execution on embedded processors
The lack of memory safety in many popular programming languages, including C and C++, has been a cause for great concern in the realm of software reliability, verification, and mo...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
ICN
2005
Springer
14 years 2 months ago
Efficient Prioritized Service Recovery Using Content-Aware Routing Mechanism in Web Server Cluster
In the future, many more people will use web service in Ubiquitous environments. SMD-cluster, which is one of previous research, is a proposed scalable cluster system to meet the c...
Euisuk Kang, Sook-Heon Lee, Myong-Soon Park
DIMVA
2010
13 years 10 months ago
Conqueror: Tamper-Proof Code Execution on Legacy Systems
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Co...
Lorenzo Martignoni, Roberto Paleari, Danilo Brusch...