Sciweavers

1506 search results - page 150 / 302
» Application Deployment in Virtual Networks Using the X-Bone
Sort
View
144
Voted
SOSP
2003
ACM
16 years 15 days ago
Upgrading transport protocols using untrusted mobile code
In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use to com...
Parveen Patel, Andrew Whitaker, David Wetherall, J...
ACSAC
2005
IEEE
15 years 9 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger
PERCOM
2010
ACM
15 years 2 months ago
UpperWare: Bringing resources back to the system
If we expect the computer to vanish in the background, to make pervasive computing a reality, first we must be able to provide the illusion that all the user’s computers, devic...
Francisco J. Ballesteros, Gorka Guardiola, Enrique...
137
Voted
SIMULATION
2010
178views more  SIMULATION 2010»
14 years 10 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...
117
Voted
IDEAS
2005
IEEE
97views Database» more  IDEAS 2005»
15 years 9 months ago
An Integrated Commit Protocol for Mobile Network Databases
While traditional fixed-wired network protocols like 2Phase-Commit guarantee atomicity, we cannot use them in mobile low bandwidth networks where network partitioning, node failu...
Joos-Hendrik Böse, Stefan Böttcher, Le G...