Sciweavers

205 search results - page 32 / 41
» Foundations for Intrusion Prevention
Sort
View
ICSEA
2006
IEEE
14 years 4 months ago
Enforcing Interaction Properties in AOSD-Enabled Systems
The construction and maintenance of large and complex software systems depend on the existence of global principles describing the structure and the interaction among its various ...
Constantin Serban, Shmuel S. Tyszberowicz
SMI
2006
IEEE
112views Image Analysis» more  SMI 2006»
14 years 4 months ago
ReMESH: An Interactive Environment to Edit and Repair Triangle Meshes
Polygonal meshes obtained from acquisition of real-world objects may easily exhibit topological or geometrical defects, which often prevent subsequent processing and analysis to p...
Marco Attene, Bianca Falcidieno
CCS
2005
ACM
14 years 4 months ago
Control-flow integrity
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such at...
Martín Abadi, Mihai Budiu, Úlfar Erl...
P2P
2003
IEEE
14 years 4 months ago
Establishing Trust in Distributed Storage Providers
— Corporate IT as well as individuals show increasing interest in reliable outsourcing of storage infrastructure. Decentralized solutions with their resilience against partial ou...
Germano Caronni, Marcel Waldvogel
SASN
2003
ACM
14 years 4 months ago
SECTOR: secure tracking of node encounters in multi-hop wireless networks
In this paper we present SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks. This information can be u...
Srdjan Capkun, Levente Buttyán, Jean-Pierre...