Sciweavers

772 search results - page 26 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
SOSP
2007
ACM
14 years 4 months ago
Secure virtual architecture: a safe execution environment for commodity operating systems
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach...
John Criswell, Andrew Lenharth, Dinakar Dhurjati, ...
DAC
2002
ACM
14 years 8 months ago
System design methodologies for a wireless security processing platform
Srivaths Ravi, Anand Raghunathan, Nachiketh R. Pot...
SP
1997
IEEE
106views Security Privacy» more  SP 1997»
14 years 1 days ago
Secure Software Architectures
The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which...
Mark Moriconi, Xiaolei Qian, Robert A. Riemenschne...
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
14 years 2 months ago
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today’s computers. Malware is often designed to immediately disable ...
Bryan D. Payne, Martim Carbone, Monirul I. Sharif,...
IDMS
2001
Springer
133views Multimedia» more  IDMS 2001»
14 years 8 days ago
An Access Control Architecture for Metropolitan Area Wireless Networks
This paper introduces a novel access control architecture for publicly accessible, wireless networks. The architecture was designed to address the requirements obtained from a case...
Stefan Schmid, Joe Finney, Maomao Wu, Adrian Frida...