Sciweavers

314 search results - page 41 / 63
» ITOSS: An Integrated Toolkit For Operating System Security
Sort
View
SWS
2004
ACM
14 years 2 months ago
Creating non-decomposable stream bundles in multimedia web services using uSMIL
Technical advances in networks, operating systems and web based services are enabling new web-based services such as audiovisual surveillance, monitoring and recording of unfoldin...
Naren Kodali, Csilla Farkas, Duminda Wijesekera
HOTOS
2003
IEEE
14 years 1 months ago
Cosy: Develop in User-Land, Run in Kernel-Mode
User applications that move a lot of data across the user-kernel boundary suffer from a serious performance penalty. We provide a framework, Compound System Calls (CoSy), to enhan...
Amit Purohit, Charles P. Wright, Joseph Spadavecch...
EUC
2008
Springer
13 years 10 months ago
A Qualitative Risk Analysis for the GPRS Technology
This paper presents a qualitative risk analysis of the General Packet Radio Service (GPRS) technology. GPRS presents several essential security weaknesses which may lead to securi...
Christos Xenakis, Danae Apostolopoulou, Angeliki P...
SAFECOMP
2004
Springer
14 years 2 months ago
Using Formal Methods in a Retrospective Safety Case
Today the development of safety-critical systems is to a large extent guided by standards that make demands on both development process and system quality. Before the advent of the...
Lars-Henrik Eriksson
MAS
1998
Springer
145views Communications» more  MAS 1998»
14 years 25 days ago
Language Issues in Mobile Program Security
Abstract. Many programming languages have been developed and implemented for mobile code environments. They are typically quite expressive. But while security is an important aspec...
Dennis M. Volpano, Geoffrey Smith