Sciweavers

1000 search results - page 58 / 200
» Application Access Control at Network Level
Sort
View
DSN
2005
IEEE
14 years 1 months ago
On-Line Detection of Control-Flow Errors in SoCs by Means of an Infrastructure IP Core
1 In sub-micron technology circuits high integration levels coupled with the increased sensitivity to soft errors even at ground level make the task of guaranteeing systems’ depe...
Paolo Bernardi, Leticia Maria Veiras Bolzani, Maur...
DISCEX
2003
IEEE
14 years 28 days ago
Dynamic Authorization and Intrusion Response in Distributed Systems
This paper¢ presents an authorization framework for supporting fine-grained access control policies enhanced with light-weight intrusion/misuse detectors and response capabiliti...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim
CN
2002
87views more  CN 2002»
13 years 7 months ago
Securing distributed adaptation
Open architecture networks provide applications with fine-grained control over network elements. With this control comes the risk of misuse and new challenges to security beyond th...
Jun Li, Mark Yarvis, Peter L. Reiher
ESORICS
2007
Springer
14 years 1 months ago
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
Abstract. From a security standpoint, it is preferable to implement least privilege network security policies in which only the bare minimum of TCP/UDP ports on internal hosts are ...
Paul Z. Kolano
DATE
2003
IEEE
97views Hardware» more  DATE 2003»
14 years 28 days ago
Enhancing Speedup in Network Processing Applications by Exploiting Instruction Reuse with Flow Aggregation
Instruction reuse is a microarchitectural technique that improves the execution time of a program by removing redundant computations at run-time. Although this is the job of an op...
G. Surendra, Subhasis Banerjee, S. K. Nandy