Sciweavers

1010 search results - page 156 / 202
» An Access Control Framework for Pervasive Computing Environm...
Sort
View
EUROSYS
2008
ACM
14 years 7 months ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...
CSFW
2011
IEEE
12 years 10 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...
CCS
2011
ACM
12 years 10 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...
TOG
2008
101views more  TOG 2008»
13 years 10 months ago
Synthesis of constrained walking skills
Simulated characters in simulated worlds require simulated skills. We develop control strategies that enable physically-simulated characters to dynamically navigate environments w...
Stelian Coros, Philippe Beaudoin, KangKang Yin, Mi...
GI
2004
Springer
14 years 3 months ago
An Architecture Concept for Mobile P2P File Sharing Services
Abstract: File-sharing in mobile networks has differing demands to a P2P architecture. Resource access and mediation techniques must follow constraints given in 2.5G/3G networks. E...
Frank-Uwe Andersen, Hermann de Meer, Ivan Dedinski...