Sciweavers

314 search results - page 32 / 63
» ITOSS: An Integrated Toolkit For Operating System Security
Sort
View
USS
2010
13 years 6 months ago
Baaz: A System for Detecting Access Control Misconfigurations
Maintaining correct access control to shared resources such as file servers, wikis, and databases is an important part of enterprise network management. A combination of many fact...
Tathagata Das, Ranjita Bhagwan, Prasad Naldurg
EUROSYS
2011
ACM
13 years 4 days ago
DepSky: dependable and secure storage in a cloud-of-clouds
The increasing popularity of cloud storage services has lead companies that handle critical data to think about using these services for their storage needs. Medical record databa...
Alysson Neves Bessani, Miguel P. Correia, Bruno Qu...
DATE
2008
IEEE
199views Hardware» more  DATE 2008»
14 years 3 months ago
Safe Automatic Flight Back and Landing of Aircraft Flight Reconfiguration Function (FRF)
SOFIA (Safe Automatic Flight Back and Landing of Aircraft) project is a response to the challenge of developing concepts and techniques enabling the safe and automatic return to g...
Juan Alberto Herreria Garcia
CCS
2001
ACM
14 years 1 months ago
Protecting Software Code by Guards
Abstract. Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protectin...
Hoi Chang, Mikhail J. Atallah
EUROSYS
2010
ACM
14 years 1 months ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero