Sciweavers

116 search results - page 4 / 24
» CoPS - Checker of Persistent Security
Sort
View
ACSAC
2008
IEEE
14 years 1 months ago
Defending Against Attacks on Main Memory Persistence
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such a...
William Enck, Kevin R. B. Butler, Thomas Richardso...
FOSSACS
2005
Springer
14 years 1 months ago
Bridging Language-Based and Process Calculi Security
Language-based and process calculi-based information security are well developed fields of computer security. Although these fields have much in common, it is somewhat surprising...
Riccardo Focardi, Sabina Rossi, Andrei Sabelfeld
WWW
2001
ACM
14 years 8 months ago
Establishing Persistent Identity using the Handle System
In this paper, we propose that identity reference used over distributed communication should be defined independent from any attributes and/or the public keys associated with the ...
Sam X. Sun
MA
1997
Springer
149views Communications» more  MA 1997»
13 years 11 months ago
Java-Based Mobile Agents - How to Migrate, Persist, and Interact on Electronic Service Markets
This paper presents a mobile agent approach that aims at satisfying the following requirements of open Internet-based electronic service markets: the mobile agent system should be...
Boris Liberman, Frank Griffel, Michael Merz, Winfr...
GI
1997
Springer
13 years 11 months ago
Persistent Object Systems: From Technology to Market
Abstract. This text describes how persistent object system technology developed in European basic research is being used by a small German startup software company to realize innov...
Andreas Gawecki, Florian Matthes, Joachim W. Schmi...