Sciweavers

452 search results - page 36 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
149
Voted
SOSP
2003
ACM
16 years 18 days ago
Terra: a virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity har...
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenbl...
141
Voted
GD
2008
Springer
15 years 4 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
134
Voted
PVLDB
2010
172views more  PVLDB 2010»
15 years 2 months ago
Database-support for Continuous Prediction Queries over Streaming Data
Prediction is emerging as an essential ingredient for real-time monitoring, planning and decision support applications such as intrusion detection, e-commerce pricing and automate...
Mert Akdere, Ugur Çetintemel, Eli Upfal
140
Voted
ECOOP
2005
Springer
15 years 9 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...
118
Voted
ETFA
2005
IEEE
15 years 9 months ago
Plug-and-play: bridging the semantic gap between application and transducers
Abstract – Plug-and-play is an important mechanism for achieving component integration and improving interoperability in smart transducer systems. While recent research in smart ...
Stefan Pitzek, Wilfried Elmenreich