Sciweavers

2270 search results - page 323 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
HOTOS
2007
IEEE
15 years 8 months ago
Processor Hardware Counter Statistics as a First-Class System Resource
Today's processors provide a rich source of statistical information on program execution characteristics through hardware counters. However, traditionally, operating system (...
Xiao Zhang, Sandhya Dwarkadas, Girts Folkmanis, Ka...
108
Voted
JCS
2008
69views more  JCS 2008»
15 years 4 months ago
Non-delegatable authorities in capability systems
We present a novel technique, known as the non-delegatable authority (NDA), for distributing authority to unconfined subjects in capability systems that prevents them from sharing...
Toby C. Murray, Duncan A. Grove
AINA
2007
IEEE
15 years 10 months ago
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Abstract— Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user ...
Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Pa...
NCA
2007
IEEE
15 years 10 months ago
Decoupled Quorum-Based Byzantine-Resilient Coordination in Open Distributed Systems
Open distributed systems are typically composed by an unknown number of processes running in heterogeneous hosts. Their communication often requires tolerance to temporary disconn...
Alysson Neves Bessani, Miguel Correia, Joni da Sil...
COMPSAC
1998
IEEE
15 years 8 months ago
Capability-Based Protection for Integral Object-Oriented Systems
Protection is an essential issue for the kind of heterogeneous distributed interoperable object environments, which Java and CORBA are a glimpse of. A uniform protection mechanism...
María Ángeles Díaz Fond&oacut...