Sciweavers

1615 search results - page 166 / 323
» Evaluation of current architecture frameworks
Sort
View
DSN
2005
IEEE
14 years 3 months ago
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
Most malicious attacks compromise system security through memory corruption exploits. Recently proposed techniques attempt to defeat these attacks by protecting program control da...
Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarcz...
TES
2005
Springer
14 years 3 months ago
Ad-UDDI: An Active and Distributed Service Registry
In SOA (Service Oriented Architecture), web service providers use service registries to publish services and requestors use registries to find them. The major current service regis...
Zongxia Du, Jinpeng Huai, Yunhao Liu
CCGRID
2008
IEEE
14 years 4 months ago
A Trusted Data Storage Infrastructure for Grid-Based Medical Applications
Most existing Grid technology has been foremost designed with performance and scalability in mind. When using Grid infrastructure for medical applications, privacy and security co...
Guido van 't Noordende, Sílvia Delgado Olab...
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
14 years 4 months ago
Integrating Security Modeling into Embedded System Design
There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techni...
Matthew Eby, Jan Werner, Gabor Karsai, Ákos...
GLOBECOM
2006
IEEE
14 years 4 months ago
A Distributed Policy Based Solution in a Fault Management Scenario
– The Madeira project, part of the Celtic Initiative1 , investigates the use of a fully distributed, policy-based network management framework that exploits the peer-to-peer para...
Ricardo Marin, Julio Vivero, Hai Nguyen, Joan Serr...