Sciweavers

2009 search results - page 319 / 402
» A privacy-aware access control system
Sort
View
IEEEARES
2009
IEEE
14 years 3 months ago
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring
—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are able to compromise the entire system, placing it under malicious control, while eluding...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
SAC
2005
ACM
14 years 2 months ago
A case study of separation of duty properties in the context of the Austrian "eLaw" process
Over the last few years rapid progress has been made in moving from conceptual studies, “whitepapers” and initiatives to the actual deployment of e-Government systems [13]. In...
Andreas Schaad, Pascal Spadone, Helmut Weichsel
BMCBI
2007
151views more  BMCBI 2007»
13 years 9 months ago
The Genopolis Microarray Database
Background: Gene expression databases are key resources for microarray data management and analysis and the importance of a proper annotation of their content is well understood. ...
Andrea Splendiani, Marco Brandizi, Gael Even, Otta...
NETWORK
2007
121views more  NETWORK 2007»
13 years 8 months ago
Toward Efficient Service-Level QoS Provisioning in Large-Scale 802.11-Based Networks
Along with recent advances in mobile networking and portable computing technologies, there is a trend in the telecommunications industry toward the development of efficient ubiqui...
Tarik Taleb, Abdelhamid Nafaa, Liam Murphy, Kazuo ...
USENIX
2008
13 years 11 months ago
Vx32: Lightweight User-level Sandboxing on the x86
Code sandboxing is useful for many purposes, but most sandboxing techniques require kernel modifications, do not completely isolate guest code, or incur substantial performance co...
Bryan Ford, Russ Cox