Sciweavers

343 search results - page 16 / 69
» Finding latent performance bugs in systems implementations
Sort
View
CCS
2011
ACM
12 years 7 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
EDCC
2006
Springer
13 years 11 months ago
Construction of a Highly Dependable Operating System
It has been well established that most operating system crashes are due to bugs in device drivers. Because drivers are normally linked into the kernel address space, a buggy drive...
Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Ho...
CAINE
2004
13 years 9 months ago
An Architecture for a Hardware Implementation of the OSPF Protocol
The problem of finding a shortest path is common to many different fields including transportation systems, mechanical systems and computer communications. Most telecommunication ...
Mohamed Abou-Gabal, Raymond Peterkin, Dan Ionescu
SADFE
2008
IEEE
14 years 2 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
FMCAD
2000
Springer
13 years 11 months ago
Monitor-Based Formal Specification of PCI
Bus protocols are hard to specify correctly, and yet it is often critical and highly beneficial that their specifications are correct, complete, and unambiguous. The informal speci...
Kanna Shimizu, David L. Dill, Alan J. Hu