Sciweavers

366 search results - page 18 / 74
» A decentralized mechanism for application level monitoring o...
Sort
View
NDSS
2000
IEEE
13 years 11 months ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
CLUSTER
2006
IEEE
14 years 1 months ago
Kernel-Level Measurement for Integrated Parallel Performance Views: the KTAU Project
The effect of the operating system on application performance is an increasingly important consideration in high performance computing. OS kernel measurement is key to understandi...
Aroon Nataraj, Allen D. Malony, Sameer Shende, Ala...
ICPP
2009
IEEE
14 years 2 months ago
Accelerating Checkpoint Operation by Node-Level Write Aggregation on Multicore Systems
—Clusters and applications continue to grow in size while their mean time between failure (MTBF) is getting smaller. Checkpoint/Restart is becoming increasingly important for lar...
Xiangyong Ouyang, Karthik Gopalakrishnan, Dhabales...
ICDCS
2002
IEEE
14 years 18 days ago
dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments
Distributed Role-Based Access Control (dRBAC) is a scalable, decentralized trust-management and accesscontrol mechanism for systems that span multiple administrative domains. dRBA...
Eric Freudenthal, Tracy Pesin, Lawrence Port, Edwa...
EMISAIJ
2010
13 years 2 months ago
The Proviado Access Control Model for Business Process Monitoring Components
Integrated process support is highly desirable in environments where data related to a particular business process are scattered over distributed, heterogeneous information system...
Manfred Reichert, Sarita Bassil, Ralph Bobrik, Tho...