Sciweavers

1801 search results - page 283 / 361
» Memory-Centric Security Architecture
Sort
View
SIGMETRICS
2000
ACM
101views Hardware» more  SIGMETRICS 2000»
15 years 8 months ago
Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs
We consider an architecture for a serverless distributed file system that does not assume mutual trust among the client computers. The system provides security, availability, and ...
William J. Bolosky, John R. Douceur, David Ely, Ma...
106
Voted
AGENTS
2000
Springer
15 years 8 months ago
Dataflow plan execution for software agents
Recent research has made it possible to build information agents that retrieve and integrate information from the World Wide Web. Although there now exist solutions for modeling W...
Greg Barish, Dan DiPasquo, Craig A. Knoblock, Stev...
DAC
2005
ACM
16 years 5 months ago
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Kris Tiri, Ingrid Verbauwhede
134
Voted
ESORICS
2009
Springer
16 years 5 months ago
User-Centric Handling of Identity Agent Compromise
Digital identity credentials are a key enabler for important online services, but widespread theft and misuse of such credentials poses serious risks for users. We believe that an ...
Daisuke Mashima, Mustaque Ahamad, Swagath Kannan
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
15 years 11 months ago
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
This paper describes the design, implementation and evaluation of Native Client, a sandbox for untrusted x86 native code. Native Client aims to give browser-based applications the...
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley...