Sciweavers

57 search results - page 10 / 12
» Application isolation in the JavaTM Virtual Machine
Sort
View
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
14 years 1 months ago
Minimal TCB Code Execution
TCB Code Execution (Extended Abstract)∗ Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, and Arvind Seshadri Carnegie Mellon University We propose an architect...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
EDUTAINMENT
2006
Springer
13 years 9 months ago
The ARTable: An AR-Based Tangible User Interface System
Augmented Reality (AR) and Tangible User Interface (TUI) have been proven to provide intuition to human computer interface with richness of a tactile sense. Recent implementations ...
Youngmin Park, Woontack Woo
OSDI
2006
ACM
14 years 7 months ago
Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable
In current commodity systems, applications have no way of limiting their trust in the underlying operating system (OS), leaving them at the complete mercy of an attacker who gains...
Richard Ta-Min, Lionel Litty, David Lie
POPL
1998
ACM
13 years 11 months ago
A Type System for Java Bytecode Subroutines
Java is typically compiled into an intermediate language, JVML, that is interpreted by the Java Virtual Machine. Because mobile JVML code is not always trusted, a bytecode verifi...
Raymie Stata, Martín Abadi
IPSN
2007
Springer
14 years 1 months ago
Harbor: software-based memory protection for sensor nodes
Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no...
Ram Kumar, Eddie Kohler, Mani B. Srivastava