Sciweavers

2486 search results - page 73 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
ASPLOS
2006
ACM
14 years 2 months ago
Manitou: a layer-below approach to fighting malware
Unbeknownst to many computer users, their machines are running malware. Others are aware that strange software inhabits their machine, but cannot get rid of it. In this paper, we ...
Lionel Litty, David Lie
PCI
2009
Springer
14 years 1 months ago
A Foundation for Defining Security Requirements in Grid Computing
—Despite the wide adoption by the scientific community, grid technologies have not been given the appropriate attention by enterprises. This is merely due to the lack of enough s...
Antonios Gouglidis, Ioannis Mavridis
HUC
2004
Springer
14 years 2 months ago
ActiveBelt: Belt-Type Wearable Tactile Display for Directional Navigation
In this paper we propose a novel wearable interface called “ActiveBelt” that enables users to obtain multiple directional information with the tactile sense. Since the informat...
Koji Tsukada, Michiaki Yasumura
FUIN
2002
100views more  FUIN 2002»
13 years 8 months ago
UPSILON: Universal Programming System with Incomplete Lazy Object Notation
This paper presents a new model of computation that differs from prior models in that it emphasizes data over flow control, has no named variables and has an object-oriented flavo...
Brian Postow, Kenneth W. Regan, Carl H. Smith
ICNS
2007
IEEE
14 years 3 months ago
Towards System-level Optimization for High Performance Unified Threat Management
To build holistic protection against complex and blended network threats, multiple security features need to be integrated into a unified security architecture, which requires in ...
Yaxuan Qi, Baohua Yang, Bo Xu, Jun Li