Sciweavers

1801 search results - page 57 / 361
» Implementation-Oriented Secure Architectures
Sort
View
CCS
2010
ACM
15 years 3 months ago
CRAFT: a new secure congestion control architecture
Congestion control algorithms seek to optimally utilize network resources by allocating a certain rate for each user. However, malicious clients can disregard the congestion contr...
Dongho Kim, Jerry T. Chiang, Yih-Chun Hu, Adrian P...
SOSP
2007
ACM
16 years 2 days ago
Secure virtual architecture: a safe execution environment for commodity operating systems
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach...
John Criswell, Andrew Lenharth, Dinakar Dhurjati, ...
86
Voted
COMPSAC
2006
IEEE
15 years 9 months ago
A Software Architectural Approach to Security by Design
This paper shows how an architecture description notation that has support for timed events can be used to provide a meta-language for specifying exact communication semantics. Th...
Arnab Ray, Rance Cleaveland
HPCA
2006
IEEE
16 years 3 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
JUCS
2010
89views more  JUCS 2010»
15 years 1 months ago
Towards a Virtual Trusted Platform
: The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisati...
Martin Pirker, Ronald Toegl