Sciweavers

2814 search results - page 88 / 563
» Can We Make Operating Systems Reliable and Secure
Sort
View
CCS
2007
ACM
15 years 8 months ago
Improving multi-tier security using redundant authentication
Multi-tier web server systems are used in many important contexts and their security is a major cause of concern. Such systems can exploit strategies like least privilege to make ...
Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita...
164
Voted
GLOBECOM
2008
IEEE
15 years 11 months ago
A Secure VANET MAC Protocol for DSRC Applications
— Vehicular ad hoc networking is an important component of Intelligent Transportation Systems. The main benefit of vehicular ad hoc network (VANET) communication is seen in activ...
Yi Qian, Kejie Lu, Nader Moayeri
ACSAC
2001
IEEE
15 years 8 months ago
DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications
Traditional database security mechanisms are very limited in defending successful data attacks. Authorized but malicious transactions can make a database useless by impairing its ...
Peng Liu
TCC
2009
Springer
184views Cryptology» more  TCC 2009»
16 years 5 months ago
Secure Arithmetic Computation with No Honest Majority
We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case o...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai
137
Voted
SIGMETRICS
2006
ACM
123views Hardware» more  SIGMETRICS 2006»
15 years 10 months ago
Exploiting redundancy to conserve energy in storage systems
This paper makes two main contributions. First, it introduces Diverted Accesses, a technique that leverages the redundancy in storage systems to conserve disk energy. Second, it e...
Eduardo Pinheiro, Ricardo Bianchini, Cezary Dubnic...