Sciweavers

160 search results - page 25 / 32
» Key Attestation from Trusted Execution Environments
Sort
View
TDSC
2010
119views more  TDSC 2010»
13 years 3 months ago
On the General Applicability of Instruction-Set Randomization
We describe Instruction-Set Randomization (ISR), a general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoffs' principle to creat...
Stephen W. Boyd, Gaurav S. Kc, Michael E. Locasto,...
SOSP
2005
ACM
14 years 5 months ago
BAR fault tolerance for cooperative services
This paper describes a general approach to constructing cooperative services that span multiple administrative domains. In such environments, protocols must tolerate both Byzantin...
Amitanand S. Aiyer, Lorenzo Alvisi, Allen Clement,...
MKWI
2008
153views Business» more  MKWI 2008»
13 years 10 months ago
A Reference Architecture for Semantic Business Process Management Systems
: Semantic Business Process Management (SBPM) enhances BPM with semantic technologies in order to increase the degree of automation in the BPM lifecycle and help in bridging the ga...
Dimka Karastoyanova, Tammo van Lessen, Frank Leyma...
POPL
2012
ACM
12 years 4 months ago
Programming with binders and indexed data-types
We show how to combine a general purpose type system for an existing language with support for programming with binders and contexts by refining the type system of ML with a rest...
Andrew Cave, Brigitte Pientka
SCAM
2007
IEEE
14 years 2 months ago
Improved Static Resolution of Dynamic Class Loading in Java
Modern applications are becoming increasingly more dynamic and flexible. In Java software, one important flexibility mechanism is dynamic class loading. Unfortunately, the vast ...
Jason Sawin, Atanas Rountev