Sciweavers

1801 search results - page 101 / 361
» Implementation-Oriented Secure Architectures
Sort
View
OOPSLA
2010
Springer
13 years 6 months ago
Encapsulation and locality: a foundation for concurrency support in multi-language virtual machines?
We propose to search for common abstractions for different concurrency models to enable high-level language virtual machines to support a wide range of different concurrency model...
Stefan Marr
WMCSA
2012
IEEE
12 years 3 months ago
An amulet for trustworthy wearable mHealth
Mobile technology has significant potential to help revolutionize personal wellness and the delivery of healthcare. Mobile phones, wearable sensors, and home-based tele-medicine ...
Jacob Sorber, Minho Shin, Ronald A. Peterson, Cory...
VEE
2009
ACM
613views Virtualization» more  VEE 2009»
14 years 2 months ago
BitVisor: a thin hypervisor for enforcing i/o device security
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing various security functionalities. However, traditional VMMs require numerous compon...
Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimot...
CSE
2009
IEEE
14 years 2 months ago
A Hybrid Enforcement Model for Group-centric Secure Information Sharing
—Group-Centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized ...
Ram Krishnan, Ravi S. Sandhu
ESORICS
2002
Springer
14 years 7 months ago
TINMAN: A Resource Bound Security Checking System for Mobile Code
Resource security pertains to the prevention of unauthorized usage of system resources that may not directly cause corruption or leakage of information. A common breach of resource...
Aloysius K. Mok, Weijiang Yu