Sciweavers

336 search results - page 9 / 68
» Implementing CCS in Maude
Sort
View
CCS
2005
ACM
14 years 1 months ago
Improving Brumley and Boneh timing attack on unprotected SSL implementations
Since the remarkable work of Kocher [7], several papers considering different types of timing attacks have been published. In 2003, Brumley and Boneh presented a timing attack on...
Onur Aciiçmez, Werner Schindler, Çet...
CCS
2000
ACM
14 years 7 hour ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
CCS
1994
ACM
13 years 11 months ago
The Design and Implementation of Tripwire: A File System Integrity Checker
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the bas...
Gene H. Kim, Eugene H. Spafford
HASE
2007
IEEE
14 years 1 months ago
Simulation Models and Implementation of a Simulator for the Performability Analysis of Electric Power Systems Considering Interd
Electric Power Systems (EPS) become more and more critical for our society, since they provide vital services for the human activities. At the same time, obtaining dependable beha...
Francesco Romani, Silvano Chiaradonna, Felicita Di...
TASE
2009
IEEE
14 years 2 months ago
Environmental Simulation of Real-Time Systems with Nested Interrupts
Interrupts are important aspects of real-time embedded systems to handle events in time. When there exist nested interrupts in a real-time system, and an urgent interrupt is allow...
Guoqiang Li, Shoji Yuen, Masakazu Adachi