Sciweavers

696 search results - page 3 / 140
» Isolated Program Execution: An Application Transparent Appro...
Sort
View
MAGS
2007
82views more  MAGS 2007»
15 years 2 months ago
File transfer in Grid applications at deployment, execution and retrieval
In this article a three staged file transfer approach for the Grid is proposed. File transfer in the Grid can take place at three stages: deployment, user application execution, ...
Françoise Baude, Denis Caromel, Mario Leyto...
MOBISEC
2009
Springer
15 years 9 months ago
Context-Aware Monitoring of Untrusted Mobile Applications
Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
Andrew Brown, Mark Ryan
IPPS
2006
IEEE
15 years 9 months ago
Executing MPI programs on virtual machines in an Internet sharing system
Internet sharing systems aim at federating and utilizing distributed computing resources across the Internet. This paper presents a user-level virtual machine (VM) approach to MPI...
Zhelong Pan, Xiaojuan Ren, Rudolf Eigenmann, Dongy...
ACSAC
2005
IEEE
15 years 8 months ago
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing
We present e-NeXSh, a novel security approach that utilises kernel and LIBC support for efficiently defending systems against process-subversion attacks. Such attacks exploit vul...
Gaurav S. Kc, Angelos D. Keromytis
ISORC
2005
IEEE
15 years 8 months ago
RMMC Programming Model and Support Execution Engine in the TMO Programming Scheme
: While the conventional remote method invocation mechanism has been considered for a long time as the primary approach for facilitating interactions among real-time objects, a mul...
K. H. (Kane) Kim, Yuqing Li, Sheng Liu, Moon-hae K...