Sciweavers

724 search results - page 26 / 145
» Implementing Execution Controls in Unix
Sort
View
CORR
2011
Springer
217views Education» more  CORR 2011»
12 years 11 months ago
Interactive Execution Monitoring of Agent Teams
There is an increasing need for automated support for humans monitoring the activity of distributed teams of cooperating agents, both human and machine. We characterize the domain...
Pauline Berry, Thomas J. Lee, David E. Wilkins
ACSAC
2008
IEEE
14 years 2 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
ICFP
2007
ACM
13 years 12 months ago
iTasks: executable specifications of interactive work flow systems for the web
In this paper we introduce the iTask system: a set of combinators to specify work flows in a pure functional language at a very high level of abstraction. Work flow systems are au...
Rinus Plasmeijer, Peter Achten, Pieter W. M. Koopm...
DATE
2005
IEEE
107views Hardware» more  DATE 2005»
14 years 1 months ago
Fine Grain QoS Control for Multimedia Application Software
We propose a method for fine grain QoS control of dataflow applications. We assume that the application software is described as the composition of actions (C-functions) with qu...
Jacques Combaz, Jean-Claude Fernandez, Thierry Lep...
USENIX
2007
13 years 10 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...