Sciweavers

286 search results - page 18 / 58
» Authentication in the Taos Operating System
Sort
View
ISHPC
1999
Springer
14 years 2 months ago
Integrity and Performance in Network Attached Storage
Computer security is of growing importance in the increasingly networked computing environment.This work examines the issue of high-performance network security, specifically int...
Howard Gobioff, David Nagle, Garth A. Gibson
SPW
2000
Springer
14 years 1 months ago
Users and Trust in Cyberspace
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Pekka Nikander, Kristiina Karvonen
JMM
2006
126views more  JMM 2006»
13 years 10 months ago
Content Adaptation Based Approach for Ubiquitous Multimedia
ents a prototype system, called UbiCon system. By abstracting media streams into generic CONTENT entities, the system provides a simple and powerful means for services to operate m...
Haipeng Wang, Zhiwen Yu, Xingshe Zhou, Tao Zhang, ...
FAST
2003
13 years 11 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
CCS
2007
ACM
14 years 1 months ago
A framework for diversifying windows native APIs to tolerate code injection attacks
We present a framework to prevent code injection attacks in MS Windows using Native APIs in the operating system. By adopting the idea of diversity, this approach is implemented i...
Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis...