Sciweavers

577 search results - page 29 / 116
» Engineering Sufficiently Secure Computing
Sort
View
140
Voted
ISCAS
2007
IEEE
161views Hardware» more  ISCAS 2007»
15 years 8 months ago
Hardware Architecture of a Parallel Pattern Matching Engine
Abstract— Several network security and QoS applications require detecting multiple string matches in the packet payload by comparing it against predefined pattern set. This proc...
Meeta Yadav, Ashwini Venkatachaliah, Paul D. Franz...
AC
1998
Springer
15 years 2 months ago
Coordination Models and Languages
A new class of models, formalisms and mechanisms has recently evolved for describing concurrent and distributed computations based on the concept of “coordination”. The purpos...
George A. Papadopoulos, Farhad Arbab
EUROMICRO
1997
IEEE
15 years 6 months ago
The Harpoon security system for helper programs on a Pocket Companion
In this paper we present a security framework for executing foreign programs, called helpers, on a Pocket Companion: a wireless hand-held computer. A helper program as proposed is...
Gerard J. M. Smit, Paul J. M. Havinga, Daniël...
147
Voted
WWW
2010
ACM
15 years 9 months ago
Alhambra: a system for creating, enforcing, and testing browser security policies
Alhambra is a browser-based system designed to enforce and test web browser security policies. At the core of Alhambra is a policyenhanced browser supporting fine-grain security ...
Shuo Tang, Chris Grier, Onur Aciiçmez, Samu...
ECOOPW
1999
Springer
15 years 6 months ago
The Role of Trust Management in Distributed Systems Security
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis