Sciweavers

2081 search results - page 315 / 417
» Chaotic Systems Synchronization in Secure Communication Syst...
Sort
View
SACMAT
2010
ACM
15 years 8 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
SOSP
2009
ACM
16 years 24 days ago
Fast byte-granularity software fault isolation
Bugs in kernel extensions remain one of the main causes of poor operating system reliability despite proposed techniques that isolate extensions in separate protection domains to ...
Miguel Castro, Manuel Costa, Jean-Philippe Martin,...
ICCCN
2008
IEEE
15 years 10 months ago
Massively Parallel Anomaly Detection in Online Network Measurement
—Detecting anomalies during the operation of a network is an important aspect of network management and security. Recent development of high-performance embedded processing syste...
Shashank Shanbhag, Tilman Wolf
126
Voted
ICC
2007
IEEE
15 years 10 months ago
MobiSplit in a Virtualized, Multi-Device Environment
—This paper details a novel architecture, MobiSplit [17], for managing mobility in future IP based networks. The architecture separates mobility management in two levels, local a...
Julien Abeillé, Rui L. Aguiar, Joao Gir&ati...
AIS
2004
Springer
15 years 9 months ago
Proposal of High Level Architecture Extension
The paper proposes three dimensional extension to High Level ARchitecture (HLA) and Runtime Infrastructure (RTI) to solve several issues such as security, information hiding proble...
Jae-Hyun Kim, Tag Gon Kim