Sciweavers

3899 search results - page 746 / 780
» Argumentation for Access Control
Sort
View
EUROSYS
2010
ACM
14 years 23 days ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero
ACSAC
2002
IEEE
14 years 20 days ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
ACSAC
2002
IEEE
14 years 20 days ago
Safe Virtual Execution Using Software Dynamic Translation
Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing ...
Kevin Scott, Jack W. Davidson
IPPS
2002
IEEE
14 years 18 days ago
FARM: A Feedback-Based Adaptive Resource Management for Autonomous Hot-Spot Convergence System
Abstract— In this paper, we present a novel and comprehensive resource management solution for the autonomous hot-spot convergence system (AHSCS) that uses sensor web. This solut...
S. Swaminathan, G. Manimaran
ISCA
2002
IEEE
105views Hardware» more  ISCA 2002»
14 years 18 days ago
Tarantula: A Vector Extension to the Alpha Architecture
Tarantula is an aggressive floating point machine targeted at technical, scientific and bioinformatics workloads, originally planned as a follow-on candidate to the EV8 processo...
Roger Espasa, Federico Ardanaz, Julio Gago, Roger ...