Sciweavers

333 search results - page 39 / 67
» Implementing a Prototype of the Security Framework for Distr...
Sort
View
CORR
2002
Springer
93views Education» more  CORR 2002»
13 years 8 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker
OOPSLA
2004
Springer
14 years 2 months ago
Scalable extensibility via nested inheritance
Inheritance is a useful mechanism for factoring and reusing code. However, it has limitations for building extensible systems. We describe nested inheritance, a mechanism that add...
Nathaniel Nystrom, Stephen Chong, Andrew C. Myers
ICETE
2004
253views Business» more  ICETE 2004»
13 years 10 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
KESAMSTA
2007
Springer
14 years 2 months ago
Mobile Collaboration Framework for u-Healthcare Agent Services and Its Application Using PDAs
In this paper, we suggested a mobile collaboration framework based on distributed object group framework (DOGF). This paper focuses on the use of this framework to support mobile c...
Chang-Won Jeong, Dong-Ho Kim, Su-Chong Joo
CODASPY
2012
12 years 4 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...