Sciweavers

143 search results - page 10 / 29
» Design of a virtual computer security lab
Sort
View
SIGCOMM
2006
ACM
14 years 1 months ago
In VINI veritas: realistic and controlled network experimentation
This paper describes VINI, a virtual network infrastructure that allows network researchers to evaluate their protocols and services in a realistic environment that also provides ...
Andy C. Bavier, Nick Feamster, Mark Huang, Larry L...
P2P
2003
IEEE
14 years 19 days ago
Secure and Resilient Peer-to-Peer E-Mail: Design and Implementation
E-mail is a mission-critical communication function for virtually all institutions. Modern e-mail employs a servercentric design, in which the user is critically dependent on her ...
Jussi Kangasharju, Keith W. Ross, David A. Turner
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
14 years 1 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
CCS
2008
ACM
13 years 9 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...

Lecture Notes
1005views
15 years 7 months ago
Lectures on reconfigurable computing
Driven by recent innovations in Field-Programmable Gate Arrays (FPGAs), reconfigurable computing offers unique ways to accelerate key algorithms. FPGAs offer a programmable logic f...
Sherief Reda