Sciweavers

89 search results - page 5 / 18
» Implementing Security Policies using the Safe Areas of Compu...
Sort
View
HIPC
2004
Springer
14 years 29 days ago
iSAN - An Intelligent Storage Area Network Architecture
This paper describes the motivation, architecture and implementation of iSAN, an “intelligent” storage area network. The main contributions of this work are: (1) how to archite...
Ganesh M. Narayan, K. Gopinath
DEXAW
1998
IEEE
122views Database» more  DEXAW 1998»
13 years 12 months ago
A Prototype Model for Data Warehouse Security Based on Metadata
The aim of this paper is to give an overview of security relevant aspects of existing OLAP/Data Warehouse solutions, an area which has seen rather little interest from product dev...
Nevana Katic, Gerald Quirchmayr, Josef Schiefer, M...
CODES
2006
IEEE
13 years 9 months ago
Architectural support for safe software execution on embedded processors
The lack of memory safety in many popular programming languages, including C and C++, has been a cause for great concern in the realm of software reliability, verification, and mo...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
NDSS
2000
IEEE
13 years 12 months ago
Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies
The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application objects, while respecting organizational autono...
Deborah Shands, Richard Yee, Jay Jacobs, E. John S...
WWW
2010
ACM
14 years 2 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner