Sciweavers

286 search results - page 16 / 58
» Authentication in the Taos Operating System
Sort
View
EUROSYS
2007
ACM
14 years 7 months ago
Authorizing applications in singularity
We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access c...
Ted Wobber, Aydan R. Yumerefendi, Martín Ab...
MCS
2007
Springer
14 years 4 months ago
Index Driven Combination of Multiple Biometric Experts for AUC Maximisation
A biometric system produces a matching score representing the degree of similarity of the input with the set of templates for that user. If the score is greater than a prefixed th...
Roberto Tronci, Giorgio Giacinto, Fabio Roli
JSSPP
2005
Springer
14 years 3 months ago
Enhancing Security of Real-Time Applications on Grids Through Dynamic Scheduling
Real-time applications with security requirements are emerging in various areas including government, education, and business. The security sensitive real-time applications can ta...
Tao Xie 0004, Xiao Qin
OSDI
2000
ACM
13 years 11 months ago
Proactive Recovery in a Byzantine-Fault-Tolerant System
This paper describes an asynchronous state-machine replication system that tolerates Byzantine faults, which can be caused by malicious attacks or software errors. Our system is t...
Miguel Castro, Barbara Liskov
CCS
2006
ACM
14 years 1 months ago
Optimizing BGP security by exploiting path stability
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol on the Internet. While the serious vulnerabilities of BGP are well known, no security solution has b...
Kevin R. B. Butler, Patrick McDaniel, William Aiel...