Sciweavers

57 search results - page 9 / 12
» Application isolation in the JavaTM Virtual Machine
Sort
View
SIGOPS
2008
120views more  SIGOPS 2008»
13 years 7 months ago
TVDc: managing security in the trusted virtual datacenter
Virtualization technology is becoming increasingly common in datacenters, since it allows for collocation of multiple workloads, consisting of operating systems, middleware and ap...
Stefan Berger, Ramón Cáceres, Dimitr...
ISCA
2007
IEEE
149views Hardware» more  ISCA 2007»
14 years 1 months ago
Virtual private caches
Virtual Private Machines (VPM) provide a framework for Quality of Service (QoS) in CMP-based computer systems. VPMs incorporate microarchitecture mechanisms that allow shares of h...
Kyle J. Nesbit, James Laudon, James E. Smith
USS
2008
13 years 9 months ago
Towards Application Security on Untrusted Operating Systems
Complexity in commodity operating systems makes compromises inevitable. Consequently, a great deal of work has examined how to protect security-critical portions of applications f...
Dan R. K. Ports, Tal Garfinkel
PE
2010
Springer
175views Optimization» more  PE 2010»
13 years 2 months ago
Generalized ERSS tree model: Revisiting working sets
Accurately characterizing the resource usage of an application at various levels in the memory hierarchy has been a long-standing research problem. Existing characterization studi...
Ricardo Koller, Akshat Verma, Raju Rangaswami
ACSAC
2002
IEEE
14 years 14 days ago
Safe Virtual Execution Using Software Dynamic Translation
Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing ...
Kevin Scott, Jack W. Davidson